0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:08:58 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xffffffffffffffff, @loopback}, 0x1c) 03:08:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:08:58 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 226.792012] hfs: uid requires an argument [ 226.796225] hfs: unable to parse mount options 03:08:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67316be3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:59 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x400000000000000, @loopback}, 0x1c) [ 226.838747] hfs: uid requires an argument [ 226.843085] hfs: unable to parse mount options 03:08:59 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:08:59 executing program 5: r0 = socket$inet6(0xa, 0x20000080812, 0x83) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0xe588a5deb4644774, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f00000010c0)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000340)) getpgrp(0x0) r8 = getpid() r9 = syz_open_procfs(r8, &(0x7f00000008c0)='net/tcp\x00') sendfile(r6, r9, &(0x7f0000000080), 0x80000003) 03:08:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:08:59 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:08:59 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xdc05000000000000, @loopback}, 0x1c) [ 227.002406] hfs: uid requires an argument [ 227.006648] hfs: unable to parse mount options 03:08:59 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) dup2(r2, r4) 03:08:59 executing program 6: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:08:59 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(0xffffffffffffffff, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:08:59 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200001100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:08:59 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x20, 0x1) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r8 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000700)='}\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', r8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r9, &(0x7f0000000080), 0x80000003) 03:08:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[], 0x0) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2400, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x3, 0x1ff}, &(0x7f0000000180)=0x8) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000240)={0x0, 0x0, 0x27, 0x7fff, "a8a1bb82672e82ff48d3200986e2abd6600a3a132073f0fa372fe3230d3db1fd"}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000001c0)={r4, 0x1}, &(0x7f0000000200)=0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:08:59 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x3000000, @loopback}, 0x1c) 03:08:59 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 227.707606] hfs: uid requires an argument [ 227.711847] hfs: unable to parse mount options 03:08:59 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x2000, @loopback}, 0x1c) 03:08:59 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000801, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000), 0xfffffffffffffd8b) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) getsockname$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x12}, 0x2}, 0x1c) setsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000140)=0x8, 0x4) 03:08:59 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, 0xffffffffffffffff) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:08:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:08:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180)='/proc/self/net/pfkey\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20000, &(0x7f0000000240)={'trans=xen,', {[{@msize={'msize', 0x3d, 0x9}}]}}) connect$bt_sco(r3, &(0x7f0000000140)={0x1f, {0x8, 0x401, 0x100000000, 0x0, 0xff, 0xcb}}, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:59 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = memfd_create(&(0x7f0000000640)="75737f7200", 0x2) r2 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffb) ioctl(r2, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r4 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r5 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r6) iopl(0x1) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r5, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r1, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r5, 0x1, 0xb, &(0x7f00000002c0)=0x8, 0xfffffffffffffe88) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000cc0), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r4, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r5, r7, &(0x7f0000000080), 0x80000003) 03:08:59 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000000000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 227.891899] hfs: uid requires an argument [ 227.896197] hfs: unable to parse mount options [ 227.941290] hfs: uid requires an argument [ 227.945547] hfs: unable to parse mount options 03:09:00 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r3) 03:09:00 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xffffffff00000000, @loopback}, 0x1c) 03:09:00 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:00 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:00 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000000)=0x6b65a878, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6d}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) sendto$inet6(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0xf}, 0x1c) 03:09:00 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r4, 0x546b, &(0x7f0000000640)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = memfd_create(&(0x7f0000000200)='\x00', 0x2) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000240)={0x1, 0x1000, [{0x7, 0x0, 0x2}]}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)="d01bb324f50b32c8b363030dced7f7887e00c8928f60918b29f94de1a410d233acd78892352e121e1c5c50ceb56ed519ec881677aaa38eebff11", &(0x7f0000000140)="7abc1f6e77331dad7849627ded51ac9397d36e28840b2e35015effbb57336cbeb44f5349a3b8f558332ed760e835a4430c9ec763d4fd7068c08a0ac5f674265484cce58e2b66cf4388c8d622fc89522d2ad528b4970fbbc7f4ae4634dc286ae2d7569c3271", 0x3a, 0x65}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x100, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_NMI(r3, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="fb0fd291057750219665667f6ff0d8362819f99c1867b555448b69cd76e6f72487ec64876218582f19396a9abffce1fd8fcef58fa2796711a92be9fb2fe13ebe96c9cb3aff472ce8798eeb0cc5fb25f5cf8ed66c293dda08155707022a9fc2626a1f8649d41ee83bed7fcc412230bb5147bc6f25c3c9f53313cb85d10d418fd160aa4dd9a1a8061770161fea4b42a29d8418072fcddf273af48a221edcfdee14cb22344d3374f69eb4f6bfa663c86d337291c5f4fbfddfce8f5edc1967412a7f76b38cb147"], 0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000004c0)=0x3000) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000480)={r4, 0x100000000}, 0x8) [ 228.573646] hfs: uid requires an argument [ 228.577872] hfs: unable to parse mount options 03:09:00 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x900000000000000, @loopback}, 0x1c) 03:09:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r3, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="f10f6f495ddf1d7eb23d2b46750331441a1c405b1b018d6416e125aa9e6089c79de6fb29f8566050ce9a1a6c95705706d65aec5ecbea3d0500009c1135f0e91dae33e6b185d79af26189fcdbd33c87804e4f19ec2d22fa4d7a30e3bbef39d86a15e57c73b8383dfc3a00a7db9df897f0f5d4856c1493"], 0x3) r4 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xf2, 0x80000) linkat(r4, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x1400) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:09:00 executing program 6: r0 = fanotify_init(0x10, 0x8000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f00000003c0)={&(0x7f0000000280), 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) recvmmsg(r1, &(0x7f0000006d80)=[{{0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000005c00)) sendmsg$can_bcm(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYRES16=r1, @ANYRESHEX=r0, @ANYRES16=r1, @ANYRES16, @ANYRESOCT=r1, @ANYBLOB="59d593e8888d24b4bc1442c7381191a03f0fb6855c4ba5f70ad82e3180b5e207f620e07e5a889680e2f229fc3b3a2a67a4782fc3d89432d3efda7fafc3388c2d4355c5086cfa4a63793855352e0303a00f89754e6ef9ab061df1a11748a80f4ed859cbf8be0a237949674703bca10eeb9b9382b75dd5ae1dd3951607dada4ccb42c79e1568d65102729e7fe59ac61e7396c0922ef555ebb60ca2ec8c0670a6af74e8f18682b58b9f9e404ad7a546e45950ab1271f44a2b41fd72ebf426ff8219a46e8f673cfeba35db279de4b71bb7a2494a8d2956d40a59955b38730432ba8852a161014003b74fec", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=r1, @ANYRESOCT=r1, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRES16=r1, @ANYRES64=0x0, @ANYBLOB="b62581a94ad17d75295351dca8152a2f31fdcce1497a097cb24191651508da4ac46362db0ee497383bb9", @ANYRESHEX, @ANYBLOB="7ce4bd3c26f0c613380e125c3c6655bb44a23f33ffaa45f3e567eb885acc25c7d55867cd9154b5fd396a47c9833f3e580480d5a87dccbe69cc2ae011058a5fd6372a410c78967de9e1e5be5ada401cf8a0865c7af748c2f46af8dda0d465effb7e822fa87f6a2eb9432dc220179ec7dcdbeba7ffb385e1d5eea89360c4a7823fc62e421ec0d29670852968aa65270e6ab9c684f61ca429f835406578ef13a6979f1f89a113f19e", @ANYPTR], @ANYRESDEC=0x0, @ANYRESDEC=r0, @ANYPTR, @ANYRES16, @ANYRES64=r0, @ANYPTR64]], 0x7}}, 0x0) sendto(r1, &(0x7f00000000c0)="f4d2eef031e16072730466072adcbde70436cbcc0abdd6e30154fd587d197e707230b70e1e252ed31ec561983713ffaa1a294262b7b3878b9b3e21701579f45c2b81c15c64fe017f3323759d802d5e281c3bff0e26d384e61af41eac4fe9031b86cdf078ad0f883a0a9c91785f3293c4b4bec7936e7b4a178736018a8b85c2de4a", 0x81, 0x4000000, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @multicast1}, 0x0, 0x2, 0x3}}, 0x80) 03:09:00 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:00 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:00 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:00 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xe000000, @loopback}, 0x1c) [ 228.799815] hfs: uid requires an argument [ 228.804041] hfs: unable to parse mount options [ 228.835267] hfs: uid requires an argument [ 228.839497] hfs: unable to parse mount options 03:09:01 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) sendfile(r1, r0, &(0x7f00000000c0), 0x58) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:01 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:01 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:01 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x4000000, @loopback}, 0x1c) 03:09:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:01 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 229.454543] hfs: uid requires an argument [ 229.458758] hfs: unable to parse mount options 03:09:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:01 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x6000000000000000, @loopback}, 0x1c) [ 229.499094] hfs: uid requires an argument [ 229.503349] hfs: unable to parse mount options 03:09:01 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0xffffffffffffffff) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:01 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000000000400", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:01 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000020000)=0x5, 0x4) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = semget(0x3, 0x0, 0x1) r2 = getuid() getgroups(0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xee00]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000440)={{0x40, r2, r3, r4, r5, 0x5a4403de564010ab, 0x5}, 0x47, 0x7, 0x9}) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000004000), 0x0, &(0x7f0000000080)=[@fadd={0x58, 0x114, 0x6, {{0x0, 0x100000001}, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x8, 0x16, 0x2526, 0xbd, 0x0, 0x49}}], 0x58}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000640), &(0x7f0000000680)=0x8) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) connect(0xffffffffffffffff, &(0x7f0000000240)=@ll, 0x80) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000600), 0x4) 03:09:01 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000640)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000005, 0x3) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 229.597553] hfs: uid requires an argument [ 229.601785] hfs: unable to parse mount options 03:09:01 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc8070081000000406270") setrlimit(0x40000000000008, &(0x7f0000000000)={0x4847, 0xfffffffffffff001}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x82040, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)={0x79, 0x0, [0x10000, 0x100, 0xe5, 0x90ea]}) mlock(&(0x7f0000005000/0x4000)=nil, 0x4000) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock(&(0x7f0000007000/0x1000)=nil, 0x1000) [ 229.640392] hfs: uid requires an argument [ 229.644751] hfs: unable to parse mount options 03:09:01 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x2000000000000000, @loopback}, 0x1c) 03:09:02 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673ff", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:02 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00@\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:02 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0xa, 0x80000001) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000840)=@file={0x0, './file0\x00'}, 0x20d) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:02 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0x1, @local}) listen(r0, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) 03:09:02 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x2000000, @loopback}, 0x1c) [ 230.331216] QAT: Invalid ioctl 03:09:02 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000e80)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x20000000, @loopback}, {0x2, 0x0, @multicast1}, 0x200000027}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0xfffffffffffffffc, &(0x7f0000000340)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007ff, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) r3 = accept$inet(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000140)=0x10) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x78) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:02 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x700, @loopback}, 0x1c) 03:09:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 230.410603] QAT: Invalid ioctl 03:09:02 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:02 executing program 6: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) mq_timedreceive(r2, &(0x7f0000000000)=""/45, 0x2d, 0x6, 0x0) 03:09:02 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720007fffffe00", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 230.551428] hfs: uid requires an argument [ 230.555675] hfs: unable to parse mount options [ 230.584193] hfs: uid requires an argument [ 230.588511] hfs: unable to parse mount options 03:09:03 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:03 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x300000000000000, @loopback}, 0x1c) 03:09:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair(0x3, 0x0, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000080)={0x7, 0x6}) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x2) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000532000)=0x19) ioctl$TCFLSH(r3, 0x5437, 0x0) 03:09:03 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0xfffffffffffffffd) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000001100)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r1, r5, &(0x7f0000000080)=0xfffffdfffffffffc, 0x80000003) 03:09:03 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:03 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r7, &(0x7f0000000080), 0x80000003) 03:09:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 231.215780] hfs: uid requires an argument [ 231.220090] hfs: unable to parse mount options 03:09:03 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:03 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0xb, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)={{0x0}}) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x40000, &(0x7f0000e68000)={0x2, 0x4e23, @rand_addr=0x9}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYPTR=&(0x7f0000000640)=ANY=[@ANYRES16=r4, @ANYRESHEX=0x0, @ANYRES16=r8]]}) r9 = socket$inet6(0xa, 0x40000000000000a, 0x0) ioctl(r9, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) io_setup(0x2, &(0x7f0000000100)) 03:09:03 executing program 6: r0 = dup(0xffffffffffffff9c) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080)=0x9, 0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f00000010c0), &(0x7f0000000000)=0x60) 03:09:03 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:03 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xdc050000, @loopback}, 0x1c) 03:09:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 231.290806] hfs: uid requires an argument [ 231.295073] hfs: unable to parse mount options 03:09:03 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 231.410233] hfs: uid requires an argument [ 231.414466] hfs: unable to parse mount options [ 231.460623] hfs: uid requires an argument [ 231.464862] hfs: unable to parse mount options 03:09:04 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:04 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x40) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) sendmsg$nl_generic(r1, &(0x7f0000008000)={&(0x7f0000cceff4)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000731ef4)={0x20, 0x27, 0x829, 0x0, 0x0, {0x11}, [@nested={0xc, 0x9, [@typed={0x5, 0x1, @ipv4=@broadcast}]}]}, 0x20}}, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) 03:09:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:04 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x60000000, @loopback}, 0x1c) 03:09:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:04 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 232.094287] netlink: 'syz-executor6': attribute type 1 has an invalid length. [ 232.113911] hfs: uid requires an argument [ 232.118147] hfs: unable to parse mount options 03:09:04 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000412fc7b0b13ad3170ebac15565cddf5ceeb200e8522c87d0a072eb0128"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000140)=0x5) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x600200, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000300", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 232.145974] netlink: 'syz-executor6': attribute type 1 has an invalid length. 03:09:04 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xa00, @loopback}, 0x1c) 03:09:04 executing program 6: r0 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@nfc, &(0x7f0000000000)=0x80, 0x80000) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000180)=""/131, &(0x7f0000000240)=0x83) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x45c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 03:09:04 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:04 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x18, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000340)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 232.312453] hfs: uid requires an argument [ 232.316684] hfs: unable to parse mount options [ 232.371124] hfs: uid requires an argument [ 232.375326] hfs: unable to parse mount options 03:09:05 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000140)="7ab25ff0b1e17c246fe281ce2b9bf7fc93056153a6b85919450ae17b5f8ca341aedc737c08868688ef1d680967a040724aad2146836de909eccff6c05aff4713854a79a48547dd875d4ebb960eb7559c23aab927549375add4582577a9c9c04347931b72b32d77f6a12250693733ac873913facec80f1967a0195389e8f9d98e569df91979970e0f5e72205f58d36d9ab1435d73dabb51b7bdd3a2e3836263d2a262df73015482862d8aabd11c7c1601da20e5a5657fa835de8983f22e7b240d1a706e8170c1f4156c4f30008aed043cdcbca2e0fdc218deebc5209e586bef157928fe6384ef9e727f7fc44fb37a", 0xee}, {&(0x7f0000000300)="35c8569d34f607c835d517e3f67bcd761c4ff2e4f4a0e0f8f98628f235ade71f7ba5e9b4c7f3b812c3968f5a8ee86ef1f5496efeed39160b54480209f5367d01e2eb5e640e878c7a0e4bd4af41163b713f343426460c68a25b7ee19d5ad3c66ec12ea5849d0cf58eec8b2bfcc72f416bab3e3b0121df691f3c440943c978711b2431d8f239227e9268c623f930d3ec07d3576e543425ade3558f5e61a7bf3e89880c61", 0xa3}, {&(0x7f00000003c0)="c31a0457a8ee7907b61e0fd3b63016c74c4c22930c635a58a086a6c495db98f7f1b37b846c5897a09cf162314d1548c67035f3d569329d815ef1a48881acda4a0a67fad3a406928d989dba3539b53888161f62b9316286d932b7f1a41e8f387875acd1177a415407e96a0f3f1252393535e3a72d79d0ab557dbea3f23d36b6fd36d0a8a9abc0fc094467a974e172c810b5a6a6c74c097dd6eb2959f31ecdb7c2c2c0fedfae28f71e84d89293d15b554b3eba892d3a0c5463ac38", 0xba}, {&(0x7f0000000240)="001bb90a1325c139c578336e72c14121201f57651a3165716d595698bf2bd4700d92e2ba7bf8af291ebf68cf6cb920f798aee178c0ab6eb0d1cf8a99704636b5f49df1c11d2f9ab34c50b861efd2c3d402b0e6d2984a7753133efc315d5341b98ddd85a93dfa207ab9", 0x69}, {&(0x7f00000000c0)="2319e3ce39df088ec56ee7559d", 0xd}, {&(0x7f0000000480)="90cb4c232a752c1bde57dfd8d50c29f31b965aed4742829b2672591ac66df3045e65fb334ffe93ac90f3d9cedc365b14e6e93c0559548491908cfafbd95bc24b5ed11eeb442f25b8b7b8de6ac130b06bfe26798ad91360bea778f24c3df8daab4aea0d80446517c2708a2894926be7eb61e8c600a382f18151a761343f7ea3fedb71a1280e5aea6f8f4b5207f05e441d02cf312355b65be50f59eb0c1e4761b8aee056923de60ad4e64b1e2cf4fc00c8e83e07b1211ddf0b7f1bd0874df82c27b59f4d6d9c0c56fcbd68053ab9ba858110a1d4e285", 0xd5}], 0x6) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:05 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x68, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r1, 0x1b) getpriority(0x0, 0x0) 03:09:05 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000000ffffffff00", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:05 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:05 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x80800, 0x4) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x8) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:05 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x900, @loopback}, 0x1c) 03:09:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:05 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}) ioctl(r0, 0x8918, &(0x7f0000000040)="82fd3ed25d26e6c9bebcab5d7f9870b5eef214c96f48a7dc8f24d5614d9c5a2788627ee97f5ad9340998ee600dac5bf1b9cb2510ae043b27ce3ec88568b764d23343679e3f6f1fa8ce2c4b0b521130e1751a26d10aca9a4621fdf73add2637dfabb674eaeaa0f39535145d7b440d44b4a1aff4ce042410ad6bf3ea757242bc331d96c34e4cd8b681e13eb87879d95a34a66f5d283435680bb1a2ea10c03e9613019e90da99947c206ea1c3f7e927d030323e74713868af59ce5f593941a22ff1a5d4021518ae536372edbdd75a45a6920ef9c73a08135eb8") [ 232.995109] hfs: uid requires an argument [ 232.999351] hfs: unable to parse mount options 03:09:05 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000400", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:05 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r4 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r5 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r6) iopl(0x1) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r5, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r5, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r4, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r5, r7, &(0x7f0000000080), 0x80000003) 03:09:05 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x5dc, @loopback}, 0x1c) 03:09:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10d040, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000140)=0x7) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r3, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:09:05 executing program 5: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673ff", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 233.059396] hfs: uid requires an argument [ 233.063628] hfs: unable to parse mount options 03:09:05 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x40, 0x0) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000140)="d677ea09ad800ee682e2d0ec234b245f2c1696c6a7145f559be70a4a4c49f5dd443445f5810f207e6cd3ce08b10a3827a7dbf5c9bd067b2105ab6ebfb18fd4a49d3dbe0ef0e9b73662f63bbc003a77e7c8e6b846303fdfcdebf585c2dc0b023d671f8946c178904983699a5b63d2667f"}, {&(0x7f00000001c0)="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"}, {&(0x7f00000011c0)="3cc9d5d720f690ec7346096357124a79a99f84947b89a665a5c6815084c6793e0136182f37d63c750448215982ad9ca7abbbb309b7d5f537221501a2c5bda9271127cbdf11b054a7f3e332039f254b5742d192140427bd0dd2689cf9336fb2483db033e30fee20083ff560ded9ce223305615ffe870209283f5a8db47a7469fe06c5a7a1abbd7b80cb975b7827a686ba8695"}, {&(0x7f0000001280)="dc503f921b395eacb1d865689e98ef0c1d97e08d2dd870008f8d24a2000eb25d6a8568d8c071403b4419030eb71034d0037b41546b83e45b0cd10428ea0ce28beae91a34a47e149b399bc80812d1bd57190c98a3b6594900"}], 0xfffffffffffffee) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) read(r1, &(0x7f0000000080)=""/58, 0x3a) r2 = syz_open_pts(r1, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x40, 0x0) write$P9_RREAD(r3, &(0x7f0000001480)=ANY=[@ANYBLOB="e5000000750100da0000000c58379234dfb30028ac731e7fd9690cc36c3e5f4ee7e65a8a316394b15662de3a7106b03388a2595cc31a0b3e85a4cabdfa6229812a1fbed8702405835d359b8979ba22b2c28c2e2e7b30396a7e3674ffd5731ff48468164b7265b4b32aeec996ab4857cb0ac6376f1b83575125e0ca89a65ed6b5df8514a4ea04f9cd1f9047433f49ede0431e551eb7bf5707f00feab7c7c0bfa3dfb01c4a1d4eae8fc8f0ef1e9e9762289f221ca5487bcf0ebff06f8ce0736332d54c45b97ac0da22f156b0ca7110deb4902517d09fe20ec08c04067ed47fdcd325c6fe03bcedfd3a6d476b3e602856a1188f16bdaa67ec82737b655e7493e67a14a8bcac0b1324339a4e145f7744"], 0xe5) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 03:09:05 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:05 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:05 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:05 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x700000000000000, @loopback}, 0x1c) 03:09:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='\x00']) 03:09:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000240)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x15c8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffffffffffc1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:05 executing program 6: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x89b0, &(0x7f00000000c0)={'erspan0\x00', @ifru_names='bcsf0\x00'}) ioctl$KVM_ENABLE_CAP(r0, 0x4020ae46, &(0x7f0000000000)={0x0, 0xf0ffffff7f0000}) 03:09:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0xdb}}, [0x6, 0x80000001, 0x6, 0x401, 0x100000000, 0x3, 0xfffffffffffffff7, 0xff, 0x5, 0x100000000, 0x7ff, 0x6e, 0xc01, 0x6, 0x80000001]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x1f, 0x202, 0x2, 0x2, r2}, &(0x7f0000000240)=0x10) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x5, 0x7ff}) [ 233.863154] hfs: uid requires an argument [ 233.867406] hfs: unable to parse mount options [ 233.885360] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 03:09:06 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x0, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000140)=""/237) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r2], 0x12) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:06 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000000400", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:06 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) tee(r0, r0, 0xb77, 0x8) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) 03:09:06 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x1000000, @loopback}, 0x1c) [ 233.933099] hfs: uid requires an argument [ 233.937349] hfs: unable to parse mount options 03:09:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 234.001164] proc: unrecognized mount option "" or missing value 03:09:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0xdb}}, [0x6, 0x80000001, 0x6, 0x401, 0x100000000, 0x3, 0xfffffffffffffff7, 0xff, 0x5, 0x100000000, 0x7ff, 0x6e, 0xc01, 0x6, 0x80000001]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x1f, 0x202, 0x2, 0x2, r2}, &(0x7f0000000240)=0x10) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x5, 0x7ff}) [ 234.092575] hfs: uid requires an argument [ 234.096818] hfs: unable to parse mount options [ 234.153702] hfs: uid requires an argument [ 234.158368] hfs: unable to parse mount options 03:09:06 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, 0xffffffffffffffff) 03:09:06 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100c0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x4151, 0x0, 0xffffffffffffffeb, 0x6}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000300)={r4, 0xff, "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"}, &(0x7f00000001c0)=0x107) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:06 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040), 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0xdb}}, [0x6, 0x80000001, 0x6, 0x401, 0x100000000, 0x3, 0xfffffffffffffff7, 0xff, 0x5, 0x100000000, 0x7ff, 0x6e, 0xc01, 0x6, 0x80000001]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x1f, 0x202, 0x2, 0x2, r2}, &(0x7f0000000240)=0x10) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x5, 0x7ff}) 03:09:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@broadcast, @remote, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @multicast2, @multicast1}, &(0x7f00000010c0)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001180)={'syzkaller1\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001200)=0x14, 0x80000) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000001240)={@broadcast, @empty, 0x0}, &(0x7f0000001280)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f00000014c0)={&(0x7f0000001340)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001400)=[{&(0x7f00000013c0)=""/48, 0x30}], 0x1, &(0x7f0000001440)=""/106, 0x6a, 0x8}, 0x1) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001540)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000015c0)={'erspan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001880)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000018c0)={0x0, @dev, @local}, &(0x7f0000001900)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001980)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f00000019c0)={@rand_addr, @empty, 0x0}, &(0x7f0000001a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001a40)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000001b40)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000001b80)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001c00)=""/104, 0x68}], 0x1, &(0x7f0000001cc0)=""/85, 0x55, 0x5}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002000)={0x0, @rand_addr, @local}, &(0x7f0000002040)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000002080)={@ipv4={[], [], @dev}, 0x0}, &(0x7f00000020c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002800)={'vcan0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002940)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000003140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x401}, 0xc, &(0x7f0000003100)={&(0x7f0000002980)={0x75c, r2, 0x700, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xe63}}}]}}, {{0x8, 0x1, r4}, {0xbc, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r7}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xace}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x1b4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8b6}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0xf0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8188}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x63d424ef}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r23}, {0x17c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7b}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x75c}}, 0x1) write(r0, &(0x7f0000c34fff), 0x10000009e) ioctl$TCSETSF(r0, 0x5457, &(0x7f0000000080)) 03:09:06 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x7000000, @loopback}, 0x1c) 03:09:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\v', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0xdb}}, [0x6, 0x80000001, 0x6, 0x401, 0x100000000, 0x3, 0xfffffffffffffff7, 0xff, 0x5, 0x100000000, 0x7ff, 0x6e, 0xc01, 0x6, 0x80000001]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x1f, 0x202, 0x2, 0x2, r2}, &(0x7f0000000240)=0x10) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x5, 0x7ff}) 03:09:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100, 0x0) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:06 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280), &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673c0", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:06 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:06 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xa000000, @loopback}, 0x1c) 03:09:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0xdb}}, [0x6, 0x80000001, 0x6, 0x401, 0x100000000, 0x3, 0xfffffffffffffff7, 0xff, 0x5, 0x100000000, 0x7ff, 0x6e, 0xc01, 0x6, 0x80000001]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x1f, 0x202, 0x2, 0x2, r2}, &(0x7f0000000240)=0x10) 03:09:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffe, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x4, 0x0, [{0xc0010bdf, 0x0, 0x7}, {0xbdf, 0x0, 0x8}, {0x368, 0x0, 0xffffffffffffff10}, {0xa6b, 0x0, 0x1}]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f00000000c0)={0xffff, 0x3000}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:07 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, 0xffffffffffffffff) 03:09:07 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:07 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xc8050000, @loopback}, 0x1c) 03:09:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:07 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:07 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) listxattr(&(0x7f0000000000)='./file0/bus\x00', &(0x7f00000002c0)=""/4096, 0x1000) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x6857b21ff1155d93) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x4040000000001, 0x1}) ftruncate(r0, 0x0) 03:09:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0xdb}}, [0x6, 0x80000001, 0x6, 0x401, 0x100000000, 0x3, 0xfffffffffffffff7, 0xff, 0x5, 0x100000000, 0x7ff, 0x6e, 0xc01, 0x6, 0x80000001]}, &(0x7f0000000080)=0x100) 03:09:07 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:07 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000009000", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 235.617229] hfs: uid requires an argument [ 235.621490] hfs: unable to parse mount options 03:09:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) 03:09:07 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x6000, @loopback}, 0x1c) 03:09:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0', "b9b0d32321a7dd8d156fdacafd27ca212d2949f4b858b92cc0b303a34cd039c13f16b680f171563f1dddf5f39f8a8421b7705b5e453dc7e463e83c45db23f66a42734168f1198ca6ceb325fa578cca55701b8e33c28b2d091dc3a9b05b466bc2b2488afdaf35d098280a806f2c5007997e47ff4af0f9061e78ccf5bfbc039261c2d40c0101c27197c9a6e70f83bc2795377d1c9b844837ebf4c1e0b94edc27a4ba0b3bbac931f2adb5aaa95e6e930ece885a2f170b187a101cb94fafe5d4cee868a7dcd6c21304f929492930e5677fdfa40a331087b8c678a4b4de972bfbf758270d4ad5bb7dfc7d67f49a03e9b9a1d5ad0e64043e7adc57"}, 0xfc) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f00000002c0)="baf80c66b83cf71c8366efbafc0c66edbaf80c66b805dd478266efbafc0cb01deeb83f010f00d80fc79ea3990f2214b8cc008ec8ba6100b8ffffef0f00500b6766c7442400329af8e16766c7442402020000006766c744240600000000670f011424260f01d1"}], 0x1, 0x58, &(0x7f0000000240), 0x10000091) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x4d0]}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/l2cap\x00') ioctl$void(r4, 0xc0045c7f) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f0000000140)) [ 235.696300] hfs: uid requires an argument [ 235.700663] hfs: unable to parse mount options 03:09:07 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 235.884026] hfs: uid requires an argument [ 235.888260] hfs: unable to parse mount options [ 235.920309] hfs: uid requires an argument [ 235.924623] hfs: unable to parse mount options 03:09:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, 0xffffffffffffffff) 03:09:08 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000001100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x7, 0x0, [{0xb67, 0x0, 0x6a9}, {0xabc}, {0x9c8, 0x0, 0x101}, {0x24e, 0x0, 0xcb}, {0xb20, 0x0, 0x200}, {0xae1, 0x0, 0x37}, {0x40000bff, 0x0, 0x805}]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="f11c6f762a9464e9e9e4756c24e914ee22c83bcdd9aadb9b1e8a9751cb96018eb00d6a5b6a99a7de6ce0420551e437b78d82"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:08 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000440)={0xffffffffffffffff, 0x4f81}) chdir(&(0x7f0000000080)='./file0\x00') r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x440000, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000100)={{0x7001, 0x6000, 0xf, 0xff, 0x2, 0x3, 0x3f, 0x3f, 0x9, 0x4, 0x7, 0x100000000}, {0x0, 0x6000, 0xc, 0xd43, 0x0, 0xb909, 0x80000001, 0x0, 0xce8, 0x5, 0xe9b, 0x31a}, {0x4, 0x5000, 0xe, 0x0, 0x401, 0x8, 0xd4, 0x9, 0x3, 0xfa, 0x40, 0x9}, {0x0, 0x2000, 0x0, 0x75, 0x7ff, 0x1000, 0x4, 0x99, 0x2, 0x1000, 0x3, 0x8}, {0x10f000, 0x1000, 0xf, 0x9, 0x99b, 0x5, 0x9, 0xffffffff00000000, 0x1, 0x101, 0x1f, 0x7}, {0x7000, 0x5000, 0x10, 0x2, 0x6, 0x6, 0x75b3, 0x4, 0x1, 0x1, 0x23, 0x8000}, {0x4, 0xf000, 0xa, 0x400, 0x10000, 0x2, 0x101, 0x8, 0x80000001, 0x100000001, 0x1000, 0x10001}, {0x13000, 0x2, 0x0, 0x80000000, 0x0, 0x100000000, 0x2, 0x8, 0x7fff, 0xffff, 0x7fff, 0xffff}, {0x10004, 0x1f000}, {0xf001, 0x100006}, 0x20000000, 0x0, 0x0, 0x10, 0x2, 0x4000, 0xf000, [0x8, 0x1f, 0xd1, 0x100000001]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000000)) 03:09:08 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x7000000}}, 0x1c) 03:09:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:08 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = dup2(r1, r0) getsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000140)=""/74, &(0x7f00000000c0)=0x4a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000100000000000000000000001008000ff000000ba73a31e6404c81821f6d08e093b744c663a98d0dab440d00305f85883fa1338add5420496a5af11a912140efd1102573cbea7bee7"], 0x1c}}, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000000c0)={@local, 0x74, r1}) 03:09:08 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x200000000000000}}, 0x1c) [ 236.484575] hfs: uid requires an argument [ 236.488939] hfs: unable to parse mount options 03:09:08 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673ff", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 236.551896] hfs: uid requires an argument [ 236.556153] hfs: unable to parse mount options 03:09:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:09 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) read(0xffffffffffffffff, &(0x7f0000000000)=""/126, 0xfffffeab) read(0xffffffffffffffff, &(0x7f0000000240)=""/134, 0x86) dup2(0xffffffffffffffff, r2) 03:09:09 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)) 03:09:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:09 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x3, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:09 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xffffffff00000000}}, 0x1c) 03:09:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:09 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000180)={[0x4, 0x4, 0x1, 0x10001, 0x9, 0x8, 0xfffffffffffffffa, 0x40, 0x2b, 0x3, 0x1ff, 0x7, 0x9, 0x10000, 0x6], 0x100000, 0x100800}) r1 = getpid() setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x9, @mcast2, 0x9}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e23, @loopback}], 0x4c) sched_setattr(r1, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) exit(0x402) inotify_init1(0x80800) clock_nanosleep(0x8, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000040)) [ 237.330756] hfs: uid requires an argument [ 237.334999] hfs: unable to parse mount options 03:09:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:09 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r3, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:09:09 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000feffff0700", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:09 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:09 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:09 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x300000000000000}}, 0x1c) [ 237.421657] hfs: uid requires an argument [ 237.426014] hfs: unable to parse mount options 03:09:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000140), 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="67314e15897f692c87cef17d9120f3e3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:09 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:09 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:09 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xdc050000}}, 0x1c) [ 237.586518] hfs: uid requires an argument [ 237.590772] hfs: unable to parse mount options 03:09:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000140)) 03:09:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 237.778474] hfs: uid requires an argument [ 237.782713] hfs: unable to parse mount options [ 237.815571] hfs: uid requires an argument [ 237.819793] hfs: unable to parse mount options 03:09:10 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000290000004300000004000000"], 0x14}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x280, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x10001, 0x10de, 0x4, 0x5, 0x3, 0x3, 0x3, {0x0, @in={{0x2, 0x4e24, @loopback}}, 0x2, 0x5ffb, 0x800, 0x2, 0x20}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1, 0xfffffffffffffffc}, 0x8) iopl(0x7) 03:09:10 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:10 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:10 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xc805}}, 0x1c) 03:09:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffd) socket$inet6(0xa, 0x5, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x4900, 0x0) getpeername$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(r2, &(0x7f0000000800)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYBLOB="bab77dcef264d23695406c56075f96805328d3472059252469855465d5b737725dfeb78566f26ad6f7e967e6fbba6b1c08333139cb4558ce42459c51d7d8b55d5c334e5015d5de7a70637d1a6ebcafe521d7bb4730c4d331cc8a9344b8c4c41642d9ffaf778f848f6552e971379080750dbe4274a49bdd413e301b24aadc5115a110e8eaa144f1898cb74c056d50bbe1ba44c73ddebb7117e1317850eb252fc2d6152e5d86c292fe0e0f0b3170bd536fcbc8c21da4d67af8c790109e97c1fdf81bef7af1064fd14095350222328e7bd2c0256d7bc6bc17", @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRESOCT=r0, @ANYRES32=r1, @ANYBLOB="b3b74f410438d7f4d6927ecf0f9cca712f335153553a267721d77045487f374d4f7729f0c8cbf5716296eaae3469241bcdf7f9d94264d5f418ebe3667a3240281a47fdac26191b0b30dcbabc329a70d705c9630dcf46f69a9fc2b7c7f57dd16b5ba6e5118d654491366d5a6920aa6be4241e0d772dd0c102e806a31714107c903ebfc1f7096a527269fab4516a2285ba067281e6e8553f64de996e40cc0f6fb995b0670fb2c869d5be63329b1297915df7cac14991bf491204c55640785ff02ab6bdeb0c68e9c1c23a9cc3dbf7af18f3c089981f84083ca53d6a9c894e4b042cdcb731c7172c90c46b0b76aaa4e7c7abe15577b6", @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESOCT=r2, @ANYPTR64, @ANYRES32=r0, @ANYRESDEC=r2]]], 0x3bb) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000240)={0x1, 0x8, 0x7, 0x2}, 0x6) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000200)) 03:09:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\b', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:10 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000300", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:10 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:10 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x700}}, 0x1c) 03:09:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x81) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="cda0ac5048f8258119b36c46cad0b9d3a22d6ad5e67c2da17d175185f1d74ea8ae5f2738322180595b2b6ec67474c17d784fce65e90de84aa5bd4c4dce345efa8999283c2109869232921d15efe9"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:10 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:10 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 238.510987] hfs: uid requires an argument [ 238.515241] hfs: unable to parse mount options 03:09:10 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:10 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x9}}, 0x1c) 03:09:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000140)={0xa, [0x8001, 0x9, 0xffffffff7fffffff, 0x7fff, 0x3, 0x5, 0x9, 0x300000, 0x3, 0xa7e9]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x20, 0x3, 0x5}}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r4, 0x80000001, 0x0, 0x4, 0x20, 0x8}, 0x14) openat(r3, &(0x7f0000000280)='./file0\x00', 0x44000, 0x2) 03:09:10 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:10 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 6: ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000009000", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 238.554404] hfs: uid requires an argument [ 238.558680] hfs: unable to parse mount options 03:09:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:10 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 6: ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:10 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x100000000000000}}, 0x1c) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) membarrier(0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:10 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 6: ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 238.716840] hfs: uid requires an argument [ 238.721082] hfs: unable to parse mount options [ 238.748367] hfs: uid requires an argument [ 238.752593] hfs: unable to parse mount options 03:09:10 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:10 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:10 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:10 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x90000, 0x0) r3 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000200), &(0x7f0000000240)=0xe, 0x80000) connect$l2tp(r2, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x1, 0x4, 0x3, 0x4, {0xa, 0x4e22, 0x7fff, @mcast1, 0x2b5}}}, 0x32) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = accept4(r0, &(0x7f0000000140)=@rc, &(0x7f00000000c0)=0x7b, 0x80000) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r4, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_open_pts(r5, 0x402800) 03:09:10 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x20000000}}, 0x1c) 03:09:11 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:11 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 238.973444] hfs: uid requires an argument [ 238.977669] hfs: unable to parse mount options 03:09:11 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00?\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:11 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 239.042929] hfs: uid requires an argument [ 239.047143] hfs: unable to parse mount options 03:09:11 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xdc05000000000000}}, 0x1c) 03:09:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673fd", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:11 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39", 0x68, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:11 executing program 5 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 239.195779] FAULT_INJECTION: forcing a failure. [ 239.195779] name failslab, interval 1, probability 0, space 0, times 0 [ 239.207257] CPU: 0 PID: 19168 Comm: syz-executor5 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 239.215743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.225095] Call Trace: [ 239.227685] dump_stack+0x1c9/0x2b4 [ 239.231318] ? dump_stack_print_info.cold.2+0x52/0x52 [ 239.236504] ? mnt_get_count+0x150/0x150 [ 239.240569] should_fail.cold.4+0xa/0x11 [ 239.244624] ? chown_common+0x730/0x730 [ 239.248597] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.253699] ? lock_acquire+0x1e4/0x540 [ 239.257672] ? __fdget_pos+0x1bb/0x200 [ 239.261558] ? lock_release+0xa30/0xa30 [ 239.265532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.271543] ? _parse_integer+0x13b/0x190 [ 239.275696] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.281229] ? _kstrtoull+0x188/0x250 [ 239.285027] ? _parse_integer+0x190/0x190 [ 239.289178] ? lock_acquire+0x1e4/0x540 [ 239.293147] ? fs_reclaim_acquire+0x20/0x20 [ 239.297466] ? lock_downgrade+0x8f0/0x8f0 [ 239.301624] ? check_same_owner+0x340/0x340 [ 239.305946] ? lock_downgrade+0x8f0/0x8f0 [ 239.310089] ? rcu_note_context_switch+0x730/0x730 [ 239.315041] __should_failslab+0x124/0x180 [ 239.319274] should_failslab+0x9/0x14 [ 239.323083] kmem_cache_alloc+0x2af/0x760 [ 239.327241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.332779] ? cap_capable+0x1f9/0x260 [ 239.336689] getname_flags+0xd0/0x5a0 [ 239.340487] user_path_mountpoint_at+0x27/0x40 [ 239.345086] ksys_umount+0x1c9/0x1310 [ 239.348884] ? kasan_check_write+0x14/0x20 [ 239.353124] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 239.358063] ? __detach_mounts+0x430/0x430 [ 239.362309] ? wait_for_completion+0x8d0/0x8d0 [ 239.366899] ? lock_release+0xa30/0xa30 [ 239.371089] ? fsnotify_first_mark+0x350/0x350 [ 239.375670] ? __fsnotify_parent+0xcc/0x420 [ 239.379989] ? fsnotify+0x14e0/0x14e0 [ 239.383794] ? __sb_end_write+0xac/0xe0 [ 239.387774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.393310] ? fput+0x130/0x1a0 [ 239.396587] ? ksys_write+0x1ae/0x260 [ 239.400382] ? __ia32_sys_read+0xb0/0xb0 [ 239.404438] ? ksys_mount+0xa8/0x140 [ 239.408152] __x64_sys_umount+0x54/0x80 [ 239.412124] do_syscall_64+0x1b9/0x820 [ 239.416006] ? finish_task_switch+0x1d3/0x870 [ 239.420497] ? syscall_return_slowpath+0x5e0/0x5e0 [ 239.425423] ? syscall_return_slowpath+0x31d/0x5e0 [ 239.430352] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 239.435365] ? prepare_exit_to_usermode+0x291/0x3b0 [ 239.440379] ? perf_trace_sys_enter+0xb10/0xb10 [ 239.445047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.449889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.455076] RIP: 0033:0x456b29 [ 239.458285] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.477191] RSP: 002b:00007fdb4f0fbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 239.484914] RAX: ffffffffffffffda RBX: 00007fdb4f0fc6d4 RCX: 0000000000456b29 [ 239.492180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 239.499440] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 239.506703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 239.513965] R13: 00000000004d60e0 R14: 00000000004c982c R15: 0000000000000000 03:09:11 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT=r1], @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX=r2, @ANYRES32=r2, @ANYRES16=r1, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYRESHEX=r1, @ANYRESOCT=0x0, @ANYRES64=r2], @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES16, @ANYRES64], @ANYRESDEC=r2]], 0xfffffd34) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:11 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000001100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:11 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:11 executing program 5 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:11 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x4000000}}, 0x1c) 03:09:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:11 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3", 0x9c, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 239.845594] FAULT_INJECTION: forcing a failure. [ 239.845594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 239.857446] CPU: 1 PID: 19191 Comm: syz-executor5 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 239.865933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.875277] Call Trace: [ 239.877868] dump_stack+0x1c9/0x2b4 [ 239.881485] ? dump_stack_print_info.cold.2+0x52/0x52 [ 239.886663] ? trace_hardirqs_on+0x10/0x10 [ 239.890889] should_fail.cold.4+0xa/0x11 [ 239.894945] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.900036] ? trace_hardirqs_on+0x10/0x10 [ 239.904253] ? lock_acquire+0x1e4/0x540 [ 239.908221] ? trace_hardirqs_on+0x10/0x10 [ 239.912445] ? trace_hardirqs_on+0x10/0x10 [ 239.916664] ? lock_downgrade+0x8f0/0x8f0 [ 239.920803] ? trace_hardirqs_on+0x10/0x10 [ 239.925024] ? mntput_no_expire+0x18e/0xbc0 [ 239.929329] ? do_raw_spin_lock+0xc1/0x200 [ 239.933547] ? mnt_get_count+0x150/0x150 [ 239.937591] ? dput.part.26+0x276/0x7a0 [ 239.941552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.947074] ? should_fail+0x246/0xd86 [ 239.950946] ? chown_common+0x730/0x730 [ 239.954905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.960001] __alloc_pages_nodemask+0x36e/0xdb0 [ 239.964658] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 239.969659] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.975182] ? _parse_integer+0x190/0x190 [ 239.979324] ? lock_acquire+0x1e4/0x540 [ 239.983283] ? fs_reclaim_acquire+0x20/0x20 [ 239.987599] ? lock_downgrade+0x8f0/0x8f0 [ 239.991729] ? lock_release+0xa30/0xa30 [ 239.995693] ? check_same_owner+0x340/0x340 [ 239.999999] cache_grow_begin+0x91/0x710 [ 240.004050] kmem_cache_alloc+0x689/0x760 [ 240.008186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.013710] getname_flags+0xd0/0x5a0 [ 240.017494] user_path_mountpoint_at+0x27/0x40 [ 240.022070] ksys_umount+0x1c9/0x1310 [ 240.025943] ? kasan_check_write+0x14/0x20 [ 240.030161] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 240.035074] ? __detach_mounts+0x430/0x430 [ 240.039294] ? wait_for_completion+0x8d0/0x8d0 [ 240.043861] ? lock_release+0xa30/0xa30 [ 240.047821] ? fsnotify_first_mark+0x350/0x350 [ 240.052387] ? __fsnotify_parent+0xcc/0x420 [ 240.056693] ? fsnotify+0x14e0/0x14e0 [ 240.060480] ? __sb_end_write+0xac/0xe0 [ 240.064448] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 240.069967] ? fput+0x130/0x1a0 [ 240.073232] ? ksys_write+0x1ae/0x260 [ 240.077034] ? __ia32_sys_read+0xb0/0xb0 [ 240.081089] ? syscall_slow_exit_work+0x500/0x500 [ 240.085928] __x64_sys_umount+0x54/0x80 [ 240.089891] do_syscall_64+0x1b9/0x820 [ 240.093848] ? finish_task_switch+0x1d3/0x870 [ 240.098327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 240.103238] ? syscall_return_slowpath+0x31d/0x5e0 [ 240.108154] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 240.113161] ? __switch_to_asm+0x34/0x70 [ 240.117211] ? __switch_to_asm+0x34/0x70 [ 240.121266] ? __switch_to_asm+0x40/0x70 [ 240.125310] ? __switch_to_asm+0x34/0x70 [ 240.129350] ? __switch_to_asm+0x40/0x70 [ 240.133393] ? __switch_to_asm+0x34/0x70 [ 240.137449] ? __switch_to_asm+0x40/0x70 [ 240.141495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.146324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.151504] RIP: 0033:0x456b29 [ 240.154683] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.173571] RSP: 002b:00007fdb4f0fbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 240.181274] RAX: ffffffffffffffda RBX: 00007fdb4f0fc6d4 RCX: 0000000000456b29 [ 240.188529] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 03:09:12 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 240.195784] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 240.203035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 240.210287] R13: 00000000004d60e0 R14: 00000000004c982c R15: 0000000000000001 [ 240.232478] hfs: uid requires an argument [ 240.236865] hfs: unable to parse mount options 03:09:12 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:12 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5", 0xb6, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:12 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xdc05}}, 0x1c) 03:09:12 executing program 5 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:12 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000000300", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="68667310", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 240.333144] hfs: uid requires an argument [ 240.337369] hfs: unable to parse mount options 03:09:12 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:13 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:13 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:13 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x2000}}, 0x1c) 03:09:13 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa", 0xc3, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:13 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:13 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="9eeed2a58942c75fc6219c55d6abc61a91771892f1974cd7f1349e244970d5bfe75e31f9a9448c104544acf30abc942e76c43251172a89ae10125a32318a736f0f75d8827ea7df9e8a40c5e5b6f035d70000"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:13 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x40000) 03:09:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 241.110575] hfs: uid requires an argument [ 241.114850] hfs: unable to parse mount options 03:09:13 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d4616341", 0xca, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:13 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000007fffffe00", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 241.170288] hfs: uid requires an argument [ 241.174500] hfs: unable to parse mount options 03:09:13 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xa}}, 0x1c) 03:09:13 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263", 0xcd, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 241.304649] hfs: uid requires an argument [ 241.308953] hfs: unable to parse mount options [ 241.345943] hfs: uid requires an argument [ 241.350186] hfs: unable to parse mount options 03:09:13 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) read(r0, &(0x7f0000000240)=""/134, 0x86) dup2(r0, r2) 03:09:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:13 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x2000000) 03:09:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2cb524504799aa150068146201370bfea2257bb6ad78068fee9c1ea53bdc025d8c8a6c84daa1fe2d895c24d8ad8ce703881bb04dc68942eb533a"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:13 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfsz', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:13 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x3}}, 0x1c) 03:09:13 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b", 0xcf, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:13 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4) 03:09:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x4200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:14 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x400000000000000}}, 0x1c) 03:09:14 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 242.136456] hfs: uid requires an argument [ 242.140669] hfs: unable to parse mount options [ 242.169583] hfs: uid requires an argument [ 242.173802] hfs: unable to parse mount options 03:09:14 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) read(r0, &(0x7f0000000240)=""/134, 0x86) dup2(r0, r2) 03:09:14 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x8cffffff00000000) 03:09:14 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xe000000}}, 0x1c) 03:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) fstatfs(r1, &(0x7f0000000140)=""/71) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10400"], 0x3) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='+cgroup\x00'}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000400)=0x3ff, 0x8) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x101800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000440)={0x0, 0xfffffe15, 0xfa00, {0xef0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13e, 0x100f}}, 0xe6eafa386a5998b6) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r5, 0x7ff}}, 0x18) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200001100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:14 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:14 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xf6ffffff00000000) [ 242.849450] hfs: uid requires an argument [ 242.853695] hfs: unable to parse mount options 03:09:14 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:14 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x6000}}, 0x1c) 03:09:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 242.922282] hfs: uid requires an argument [ 242.926512] hfs: unable to parse mount options 03:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="67c8d830000000000000000088912b510e9e03"], 0x4) r3 = accept(0xffffffffffffffff, &(0x7f0000000200)=@pptp, &(0x7f0000000280)=0x80) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x6c, r4, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x12000000000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x6c}}, 0x40) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:14 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4000000000000000) [ 243.049038] hfs: uid requires an argument [ 243.053265] hfs: unable to parse mount options [ 243.083782] hfs: uid requires an argument [ 243.088087] hfs: unable to parse mount options 03:09:15 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) read(r0, &(0x7f0000000240)=""/134, 0x86) dup2(r0, r2) 03:09:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc8070014") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:15 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(0xffffffffffffffff, r8, &(0x7f0000000080), 0x80000003) 03:09:15 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000400", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) r3 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000140)="e3a21c926ca184659688a8ccfebe57fd", 0x10) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:15 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x300}}, 0x1c) 03:09:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:15 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x200000000000000) 03:09:15 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, 0xffffffffffffffff, &(0x7f0000000080), 0x80000003) 03:09:15 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x100000000000000) 03:09:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc8070014") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 243.740976] hfs: uid requires an argument [ 243.745246] hfs: unable to parse mount options 03:09:15 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xe00}}, 0x1c) 03:09:15 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000000100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) r3 = msgget$private(0x0, 0x10) msgsnd(r3, &(0x7f0000000300)={0x0, "743a3de18c27e5f5ed6d2373532ed271f0fd99324de4aebf2b980b7d5c4f6c5e4f7422b54ca0811fcf974ddd688c1d8a2f12c718b4a60197bb3fabbca9a4d899136e31fd062ce79387dc476245f5a18803886913c74423c369416193698094fc237c6d198c2c2b8d8596345e8f5218b406476cd8aec1c27d540694eaa42b3efaafa47aa753dc43cb2f881b9273cc449ab9d7328ffdb4ebf230147f5cdb712a95ab3e6b0d4d605a6c8e9cbffab678a693d40fc084e82a296944a3245d487e8289bff8c68c17d956a8cc390c85f5cd3fee07849154ef045fc5742e3ed2a7faac46e2b349f07a910ad7b7380e1b978fb56820796257f65d21acccdc72a29f2b69a372b0866d0d8df71fe365051eb143352af822ba29ab00c0fb50a4c9e589dcd11414d55a1efaa4ecab7ed2f205c430d8fd1102cede838ad683ca3c8a8f526f9ffae386b19192a404b3ce78d4ebfa9763eb3d1a3dd97ab41b2c60c2b49a693e524ac45de9923ea0775737689c98aad0b5dd6ab479c70002e6c2724d9cbf440d848856a345656140ed138cf30afde63ce120a14026cceee83597b76df562a814cb43e81c519d297d33d918cf02b709fc97246fe406400e34d1db07996e89dc1e790478c77a4f42c481713bc6d1a68a93c0a29494d1cc7314c1320b9c6fe116dc8c4b934ff5d34cc521fca7b0878f6f534346da0f40d34631822029f3ec02e67e9a2402c4b6ceed25f8d48cd3092c0a73c611a6e02482169765f631aecaf7730b6a74f9b502c588e482cfe92ddacc853df0b51cae70a6d89ab1e7df61750e9830d15d63a88a77aa81482e80921761939f67e6413b37dc4ed10f1cf2207f07f3b105d7267bfcca0160a90899843508c93cb043475d8f3776ed60a2f043e5f8e8172e04518d6ac6688221b559c02a044b6297b39b1ebbf90c62d7a85337afb3a1bfd6f48ed23d2df8d57bbd73ffd03a584a9ccfcb523019e14d409d1b7a626c389ef9bba1ddfd936c39c156713bf7fddbf4d37f4ce49f29110442d677cfb075d1c98d70470e3c25a8b7e0f0ba262fe3ad5a764623c5def28737b75110270c620099e8ef84451d8d34a19d10bde9eea37a8d116e33c3489ff8168e3d78b03052ab8dfd85096d6c3b5b6d40322f3e33c0c4b3f972f98a0af1c9e7aaf7fd280081c73184d268659feb37e3716920ed7d0c9e4d98f2d6c5ff81d4cb2e150bf335b68cfc42da96c7a8446945f0f381f83e314b28dcfdfae0a4a7cac25bf9ac6369bee49b51c518a17b8adb6399de75e248aa28c0154007206bed513f05ebf2e34f7c73ea5c7b3a4cb04e9e1015a6212723aa4b04aa130fccacb7e21301db7f27993979aa94612db5e46eb959a47805b8120d3cee7b63701ba4fe9553fb34a30efb3c0b5f7c292392490069fe18cec982cc96b2b3e92eb06eda2a0dde4e975eaf88d7f7799e5f6274620870bb11d02013de155f98be58d38a862bc2057ca5a92c72cac1f3918935ae128b647a87c9034957bbe56b2f911adb39e04f1d9f4bce9e1f499c51fe8cc2ef5d56b6eae352a784b770d40b785fe2a939e51cba049a5d0cef648a38719bb68d93eda6cda0bbe8141f3f2a520ee9bbba4abfdbcf3c22a14cefb23cb69dd5b3fca52d8c4d914527862feefcd5506d73884854248d4a7840eaf1e1dafa1e78e89298156e9a6d867e0944e31bdbd09eb67128fe1fae2c08c7a02f165b50dcd18f0b96ad178b1b9b60b42f63762aeedbbebdec5a5b19fc95bbebb0fa246af2cdf0dae10c80b70854f4ce12469fa2131748df8c556341a76b0579356e5688a77801ed9cd300899bc2962eeae12194486ab1938d4456b1582d4a837f17b458545f35d01ef265835ceee1a12a4ebe9473de6ed5d8248fa650ff98b4bf298472db76a05600e297300e5971fe81cda413972252a1e1e58e6e3cf479b3e7b70abdfafca500376e86bacac1834bb06af19ca6a55eff2c8c03350a186c1967cacc27d8185727f6a52c1b016b60d40db46536289760bdee6f1437448f6d2807f72081a7b8d31273803795f76b65bef78f2e72ecf53de8146de19daf7879b3bfd1e05eb567665fb6924410a1ae0105d27a3f384ed6b133b3616f7385c8ffc97314fec7ef067d3a47c8bdf5f871770495d9bb3aabfaed5cc8324b86a3fa38444b8631fc1d4d63f82e2b6579e8c89228238173019cb744aea57ee702651ae93068648bb5f575209601479efb2a5de55d90bb052fbcc47bd9cfb34660b8fffcdcde35ae3bbe9771b7d64122a8741981654b71dc6ea18be57b810ec0e5c76c09fad579464373fa96b5a952a0a03e5d0858c94650c815cd872b2cf973035f74eef516715e8226dc54718b90078bfe0e61c3d44c36fcb9f2f3900846c3cb66d00a801ea90564c2ea86bd13a45af889eb132498db0298e08a620df8903a3b305478552281c7a00ea382d1d5ba3a8158978d99f3ea23ef487121b01e9161803242faf0b70f30dd0d01d3576040ae01b8ac4e2fb870e94f35628fc68e6b56086d395b68e56fd4dab2938c857237ccb90c21047d276661029ad4bf8cf74dd99282af69c13f7fd14fd22bc2da5cbd09039dc5cf1993de8e7a91b4320cf05d619a90e6489658b526f8fcac9f5ce64f6b4eb5adce0f227ed7c1520777fd0d3a83ca137a93b7d4a1fa84e6a279814f81975ba85d9bf3dbf70e8ead258d24fa0004f9cd89e0876f7d9ea4284a9ea51e917dcff140161844d406d26194b22c951b36578b97c221ec58bf11735a49f4739f76d124d8cf8c4dc3bd9d86158c68a3a21296ed039ffadca299fc95858a997b7f4a04fdb3a028c0131e6e466ca3af5ed9f0459ac4b0f564c011fb079f9818564aad63eb931707a51d4559746dbfc1c77577f29026d55626d8f1910809750246c6014e74d3f752f714e2c1d0f07ca0f353d47b3286d5c44e08c517690034751e3c5d7b4083b53b3c7eb72026835f753bcb308ecb9c8e432e92a57d800fee7ad5ae52590b07ebde7014efd1f2ea09678f32d60e49edf11995547af50fb6ffa52872b36b92a6a3b63847a2963b2a501eff3683fd76918e035867ad0404cdbb8f6b98fb2f56b3e6714274ac5b68a3246d5964f235cfee1cf54df20fc469d24b896eb8c3ab710dfd0e93c8c7609d58d5ca0233853e3e2ed2a405930630971dca36ba444251f4f55b68412c6baeca1db0b692ef82a979eba9b6991e96444b9bdd2e3f6565ee53fc8885419abccbeefb30a05e19161434f61336b1aa820844fa2bd365216d01dea44a6e312871d21b6a166e93800231a3ec2919d4bfb4f06452c1525b2dd52d13c020c8ae71f70d888bb0530780bc90bd3b746d4a6d5bc522f9dbbfb6eacde93b1acb46b317e1dbe010d57de52cb7c0926770d04d44eea2657f707b9e5bece2304d6b1980f65614cacf42f7f20204361afb68e2360a9774c1fd04acdb093a21c246ab22e1e6e13fb837daacedcc328b159f4a3e27696da90708000bbdc4b3a7e29dfd3f7325b462cbe0d058c3f182d62504c5d1af8d4cad0316da244b9a8f2d9bd922ad9c1322b4552541c436bf3d10dad57ccbe5dfd094f869c2ce470fbf74ea9003ed8ba0f0f7d8fec8724a76bdf186161d75dd01ab302537efa340d5ea3bec038260f96f47081dd062cf7578b85b057d9e2711ca250757a50392eddd85ffe44314e92cf22efb5d0802202b4b726ff1c3b58489c06dfead21a3069eb5e4a823d543198a90c6d033e1baa2352ddd5d0f1070f21fa5a9eae456131b43e77a2b9389ba68e43005bf92e12063cf73d71e690511b921450dbf15ff456133507d45b9d037a461ed2bbdf8207340780c9805be5189d9b48764624ea7b1b05b40263e93007dba52173a5f93116f8f3d93d3fc95d4b79294ee1ac318cb86f8cb775d147dc8bbfe19522388d75434da5bcf9705bf2adc7a144917268211b4ad5d31ee93c3c146bf40923a39371dd71c333a458f62078551df9b655aca2487372a0d212ffe8424b03ea5624989fb02f1d6c5132969bea887f3009fdf26e8061d13b8caac5060e5df537c79f024085c96827087feeb8efaae08c2377a973a374186913ac66c7a48f71e458b5cf9ddc20220b4ca199e370bf4c40c980aca5eb520c3a32fbb025a7fa21a9177c454fbc4a69c45181d17bda28e2799216a1254337b91a4a0eadf89cec02b1853964ac5524de2efe13b802d3d8111bdb34db7d4e0292a46f5d31f8a983df196624572242497dd1200b9a503d1cbfe41b99fdf038c0eea2976034a00ed3789ea03e5935bc379fad0ad7810e5aaf108b0c6e585dc0110e395f05a4c6a4cbe60f589d05e5dbda17a90bd04330dff6e28ad3b4241372895e0e6e2282d5f47f97693fd313b9a7d4a28ade44634c456d33e8b52655f631f4e8c66f3af028b6c449b16b5f50468ad3cdc50c8a581cc2ccbbf24107259e7d7a4a641e4718eef7b854ef8ba0f785fad81b84382c1dc89ef26f8ca76b194e98002d70befb61c209705630c15b6db2d2e2a997cfe3439a081906d4098cf6a588db1832145fd612ca6cf8156957e7314755fc7041492ae940d5780991700b7eeccf002c6980510c346c711d88de62f7176165707a405e4907cb8e29a80469b8540677e573e94425f6bb5fc04014c81ff665b81c248e0095cba0f7d96aa18e4d8bdf6ca77156648488a0cdf336ebf05f91c7a1c7c9bafabd6440146c457d7770f0e18e1a1ce5004b0c85285620dcf54b1c66629b4e378fce4f2dbe7905716fcc19348c186c2610fefc26f25621329ba943d7b1d236cb2d9df05808eb33d3706b9150a6ecbe48c66c88c6c5dfa5d488f31030adeecd1467914405b20b3538434ff96d78fda738045013a2dcb5a13ffac96db57c8eb345875c5a88b0603eb3b9ee14a41e363284e951f80d50ce630bcd8c6ee10220b20308b5bdaae91b8d02cb9aa56fbf002ca800cf78b2c9d0cf511de79f0eca4ccdf373d1cb80ad4aae25845e4923ab986c3a65f643297495a5fd5425f2cdcad97755651e5ee934f1d6e13a0b47bf80021ac2769d71ce527d02df5dd36259fe6abb3969385c99bc992812593e62247c01250bb3943133597a80acafc9ca6eb2ae25a7354d67cc7943e02ecd2e0bfb18f9fb72d78ea1b7bc5ea76eb72c03a8d186ffed246b9e1ca20ec479806bba421110e7db81d269d657617849b95c35b909a2ccf179a6536b51a993d9f7fb8c6e4f1c014fea6c00db6ee1ee58e1fb149bf847320a7459bd478b81ec07362cce467bdbc9a36e3e20a44a2bbf9f0a34c1e2792ac08aa1bc1ea40f91d588aa4b06b9452067caf1f07e029a74bc8488b662c0e3f72c3a70afc1d84f613be89fa5e7cc7f79483fc57d4221c16ea60bd85730e2bb6b8bafc47e1f49fd7e22ac92dcf11affef295d682f7b470eae49ce127161443fc15b45abc772f9d7e3fd1e4e3aa2728657eb1c359da4ddb745679b09709fc794e6417344bb5fcf6cf18efa54f3c04254369769dd3c08c78cb958a83ec393c4073d880c08a33f9981270025ac32fb604052ed6461ad0c6c0fe8eab4d912335c19dadbd288e6127e32acdeffbaaa3dc3d31697dd4c863b8bb1727689150461eef98d43811e2989bf5474635e24fb2f90b4547d43097070bfadacb487a07a048018a2a6e7415e86298f8dff300a9b9578df376386f73a82e483b5765e8bba7bb4980234df5c35f6201ddfad0fd47223ebbe8b2f309a84429e9de0a126a1fd5b644b32cecf9c1006028200225ff9fd0b5f28fdf064f1bc7b60185079f03901ce033bb1e2220325da64629ba11558c7d"}, 0x1008, 0x800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 243.816838] hfs: uid requires an argument [ 243.821067] hfs: unable to parse mount options 03:09:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc8070014") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 243.883325] hfs: uid requires an argument [ 243.887550] hfs: unable to parse mount options 03:09:16 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:16 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x5dc}}, 0x1c) 03:09:16 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x0) 03:09:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f76") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:16 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000001100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:16 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x40000000) 03:09:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x20000000000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f76") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 244.600281] hfs: uid requires an argument [ 244.604521] hfs: unable to parse mount options 03:09:16 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x700000000000000}}, 0x1c) 03:09:16 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x1000000) 03:09:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f76") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:16 executing program 4 (fault-call:7 fault-nth:0): r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:16 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00 \x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 244.704948] hfs: uid requires an argument [ 244.709233] hfs: unable to parse mount options [ 244.791988] FAULT_INJECTION: forcing a failure. [ 244.791988] name failslab, interval 1, probability 0, space 0, times 0 [ 244.803330] CPU: 1 PID: 19526 Comm: syz-executor4 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 244.811820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.821167] Call Trace: [ 244.823751] dump_stack+0x1c9/0x2b4 [ 244.827363] ? dump_stack_print_info.cold.2+0x52/0x52 [ 244.832540] ? d_alloc+0x96/0x380 [ 244.835999] ? d_alloc_parallel+0x15a/0x1eb0 [ 244.840390] ? lookup_open+0x560/0x1b90 [ 244.844344] ? path_openat+0x26e5/0x5300 [ 244.848387] ? do_sys_open+0x584/0x720 [ 244.852261] should_fail.cold.4+0xa/0x11 [ 244.856308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.861398] ? trace_hardirqs_on+0x10/0x10 [ 244.865711] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 244.870454] ? lock_acquire+0x1e4/0x540 [ 244.874417] ? is_bpf_text_address+0xae/0x170 [ 244.878914] ? trace_hardirqs_on+0x10/0x10 [ 244.883145] ? lock_release+0xa30/0xa30 [ 244.887103] ? lock_acquire+0x1e4/0x540 [ 244.891061] ? fs_reclaim_acquire+0x20/0x20 [ 244.895988] ? lock_downgrade+0x8f0/0x8f0 [ 244.900126] ? lock_acquire+0x1e4/0x540 [ 244.904085] ? check_same_owner+0x340/0x340 [ 244.908403] ? rcu_note_context_switch+0x730/0x730 [ 244.913316] ? fib_table_lookup+0xa53/0x24a0 [ 244.917711] __should_failslab+0x124/0x180 [ 244.922033] should_failslab+0x9/0x14 [ 244.925818] __kmalloc+0x2c8/0x760 [ 244.929342] ? fib_create_info+0x9b1/0x45e0 [ 244.933660] fib_create_info+0x9b1/0x45e0 [ 244.937791] ? lockdep_init_map+0x9/0x10 [ 244.941840] ? rcu_note_context_switch+0x730/0x730 [ 244.946763] ? fib_info_update_nh_saddr+0x300/0x300 [ 244.952200] ? kasan_check_write+0x14/0x20 [ 244.956420] ? __mutex_lock+0x6d0/0x1700 [ 244.960464] ? trace_hardirqs_on+0x10/0x10 [ 244.964685] ? trace_hardirqs_on+0x10/0x10 [ 244.968909] ? rtnl_lock+0x17/0x20 [ 244.972432] ? trace_hardirqs_on+0x10/0x10 [ 244.976653] ? mutex_trylock+0x2b0/0x2b0 [ 244.980695] ? _raw_spin_unlock+0x22/0x30 [ 244.984828] ? trace_hardirqs_on+0x10/0x10 [ 244.989045] ? d_instantiate_anon+0x30/0x30 [ 244.993347] ? kasan_check_read+0x11/0x20 [ 244.997477] ? do_raw_spin_unlock+0xa7/0x2f0 [ 245.001882] ? lock_acquire+0x1e4/0x540 [ 245.005843] ? __inet_dev_addr_type+0x2e0/0x490 [ 245.010495] ? lock_downgrade+0x8f0/0x8f0 [ 245.014624] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 245.019630] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 245.024648] ? fib_get_table+0x274/0x350 [ 245.028691] ? __fib_validate_source+0x1f10/0x1f10 [ 245.033613] ? __fib_validate_source+0x1f10/0x1f10 [ 245.038534] ? environ_open+0x90/0x90 [ 245.042328] fib_table_insert+0x1c1/0x17a0 [ 245.046559] ? fib_new_table+0xc0/0x490 [ 245.050515] ? fib_table_lookup+0x24a0/0x24a0 [ 245.055003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.060528] ip_rt_ioctl+0xa99/0x16f0 [ 245.064312] ? lock_downgrade+0x8f0/0x8f0 [ 245.068445] ? fib_validate_source+0x600/0x600 [ 245.073010] ? dput.part.26+0x276/0x7a0 [ 245.076981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 245.082501] ? _copy_from_user+0xdf/0x150 [ 245.086635] inet_ioctl+0x2b5/0x360 [ 245.090273] ? inet_stream_connect+0xa0/0xa0 [ 245.094663] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 245.100190] ? _kstrtoull+0x188/0x250 [ 245.104719] ? _parse_integer+0x190/0x190 [ 245.108865] sock_do_ioctl+0xe4/0x3e0 [ 245.112662] ? __fget+0x4ac/0x740 [ 245.116098] ? compat_ifr_data_ioctl+0x170/0x170 [ 245.120865] ? lock_release+0xa30/0xa30 [ 245.124824] ? pid_task+0x115/0x200 [ 245.128436] ? find_vpid+0xf0/0xf0 [ 245.131970] ? __f_unlock_pos+0x19/0x20 [ 245.135930] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 245.141104] sock_ioctl+0x30d/0x680 [ 245.144716] ? dlci_ioctl_set+0x40/0x40 [ 245.148679] ? ksys_dup3+0x690/0x690 [ 245.152387] ? kasan_check_write+0x14/0x20 [ 245.156610] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 245.161526] ? fsnotify+0xbac/0x14e0 [ 245.165313] ? vfs_write+0x2f3/0x560 [ 245.169010] ? dlci_ioctl_set+0x40/0x40 [ 245.172965] do_vfs_ioctl+0x1de/0x1720 [ 245.176845] ? fsnotify_first_mark+0x350/0x350 [ 245.181411] ? __fsnotify_parent+0xcc/0x420 [ 245.185720] ? ioctl_preallocate+0x300/0x300 [ 245.190110] ? __fget_light+0x2f7/0x440 [ 245.194065] ? fget_raw+0x20/0x20 [ 245.197500] ? __sb_end_write+0xac/0xe0 [ 245.201459] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 245.206979] ? fput+0x130/0x1a0 [ 245.210242] ? ksys_write+0x1ae/0x260 [ 245.214027] ? security_file_ioctl+0x94/0xc0 [ 245.218419] ksys_ioctl+0xa9/0xd0 [ 245.221868] __x64_sys_ioctl+0x73/0xb0 [ 245.226785] do_syscall_64+0x1b9/0x820 [ 245.230657] ? finish_task_switch+0x1d3/0x870 [ 245.235135] ? syscall_return_slowpath+0x5e0/0x5e0 [ 245.240049] ? syscall_return_slowpath+0x31d/0x5e0 [ 245.244963] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 245.249971] ? __switch_to_asm+0x34/0x70 [ 245.254030] ? __switch_to_asm+0x34/0x70 [ 245.258076] ? __switch_to_asm+0x40/0x70 [ 245.262123] ? __switch_to_asm+0x34/0x70 [ 245.266167] ? __switch_to_asm+0x40/0x70 [ 245.270225] ? __switch_to_asm+0x34/0x70 [ 245.274270] ? __switch_to_asm+0x40/0x70 [ 245.278317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.283154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.288329] RIP: 0033:0x456b29 [ 245.291516] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.310408] RSP: 002b:00007f863cdd9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.318108] RAX: ffffffffffffffda RBX: 00007f863cdda6d4 RCX: 0000000000456b29 [ 245.325359] RDX: 0000000020000840 RSI: 000000000000890b RDI: 0000000000000016 [ 245.332609] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 245.339863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 245.347112] R13: 00000000004d1190 R14: 00000000004c6c6f R15: 0000000000000000 [ 245.380438] hfs: uid requires an argument [ 245.384670] hfs: unable to parse mount options 03:09:17 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:17 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xc805000000000000}}, 0x1c) 03:09:17 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3000000) 03:09:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f7640") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:17 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000023800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673ff", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 245.451471] hfs: uid requires an argument [ 245.455794] hfs: unable to parse mount options 03:09:17 executing program 4 (fault-call:7 fault-nth:1): r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:17 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000007fffffe00", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:17 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3) 03:09:17 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xa000000}}, 0x1c) 03:09:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f7640") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:17 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:17 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000023800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f7640") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 245.809338] hfs: uid requires an argument [ 245.813560] hfs: unable to parse mount options [ 245.845692] hfs: uid requires an argument [ 245.849989] hfs: unable to parse mount options 03:09:18 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x101000, 0x0) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netfilter\x00') ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000180)) 03:09:18 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xffffff8c) 03:09:18 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x2}}, 0x1c) 03:09:18 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00@\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:18 executing program 6 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:18 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8940, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 246.472390] hfs: uid requires an argument [ 246.476807] hfs: unable to parse mount options [ 246.484477] FAULT_INJECTION: forcing a failure. [ 246.484477] name failslab, interval 1, probability 0, space 0, times 0 [ 246.495771] CPU: 1 PID: 19612 Comm: syz-executor6 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 246.504266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.513622] Call Trace: [ 246.516199] dump_stack+0x1c9/0x2b4 [ 246.519819] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.524996] ? mnt_get_count+0x150/0x150 [ 246.529056] should_fail.cold.4+0xa/0x11 [ 246.533112] ? chown_common+0x730/0x730 [ 246.537074] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.542162] ? lock_acquire+0x1e4/0x540 [ 246.546122] ? __fdget_pos+0x1bb/0x200 [ 246.549996] ? lock_release+0xa30/0xa30 [ 246.553958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.559490] ? _parse_integer+0x13b/0x190 [ 246.563627] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.569151] ? _kstrtoull+0x188/0x250 [ 246.572942] ? _parse_integer+0x190/0x190 [ 246.577096] ? lock_acquire+0x1e4/0x540 [ 246.581060] ? fs_reclaim_acquire+0x20/0x20 [ 246.585378] ? lock_downgrade+0x8f0/0x8f0 [ 246.589524] ? check_same_owner+0x340/0x340 [ 246.593834] ? lock_downgrade+0x8f0/0x8f0 [ 246.597976] ? rcu_note_context_switch+0x730/0x730 [ 246.602891] __should_failslab+0x124/0x180 [ 246.607117] should_failslab+0x9/0x14 [ 246.610911] kmem_cache_alloc+0x2af/0x760 [ 246.615046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.620580] ? cap_capable+0x1f9/0x260 [ 246.624460] getname_flags+0xd0/0x5a0 [ 246.628245] user_path_mountpoint_at+0x27/0x40 [ 246.632815] ksys_umount+0x1c9/0x1310 [ 246.636606] ? kasan_check_write+0x14/0x20 [ 246.640830] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 246.645755] ? __detach_mounts+0x430/0x430 [ 246.649977] ? wait_for_completion+0x8d0/0x8d0 [ 246.654551] ? lock_release+0xa30/0xa30 [ 246.658512] ? fsnotify_first_mark+0x350/0x350 [ 246.663077] ? __fsnotify_parent+0xcc/0x420 [ 246.667405] ? fsnotify+0x14e0/0x14e0 [ 246.671204] ? __sb_end_write+0xac/0xe0 [ 246.675165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.680687] ? fput+0x130/0x1a0 [ 246.683949] ? ksys_write+0x1ae/0x260 [ 246.687756] ? __ia32_sys_read+0xb0/0xb0 [ 246.691824] ? syscall_slow_exit_work+0x500/0x500 [ 246.696678] __x64_sys_umount+0x54/0x80 [ 246.700640] do_syscall_64+0x1b9/0x820 [ 246.704520] ? finish_task_switch+0x1d3/0x870 [ 246.709003] ? syscall_return_slowpath+0x5e0/0x5e0 [ 246.713916] ? syscall_return_slowpath+0x31d/0x5e0 [ 246.718832] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 246.724094] ? __switch_to_asm+0x34/0x70 [ 246.728138] ? __switch_to_asm+0x34/0x70 [ 246.732195] ? __switch_to_asm+0x40/0x70 [ 246.736252] ? __switch_to_asm+0x34/0x70 [ 246.740304] ? __switch_to_asm+0x40/0x70 [ 246.744352] ? __switch_to_asm+0x34/0x70 [ 246.748397] ? __switch_to_asm+0x40/0x70 [ 246.752449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.757288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.762459] RIP: 0033:0x456b29 [ 246.765637] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.784533] RSP: 002b:00007f46f3a0ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 246.792228] RAX: ffffffffffffffda RBX: 00007f46f3a0b6d4 RCX: 0000000000456b29 [ 246.799490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 246.806744] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 246.814008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 03:09:18 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xfffffff6) 03:09:18 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200009000", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 246.821270] R13: 00000000004d60e0 R14: 00000000004c982c R15: 0000000000000000 03:09:18 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xe}}, 0x1c) 03:09:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) 03:09:18 executing program 6 (fault-call:4 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:18 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x891b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673f6", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 246.865848] hfs: uid requires an argument [ 246.870151] hfs: unable to parse mount options 03:09:18 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3f00000000000000) 03:09:19 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:19 executing program 1: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xff, 0xa00) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000180)={0x6, [0x22f, 0x1000, 0x8, 0x100000000, 0x707f, 0x3]}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x10480, 0x0) write$FUSE_LSEEK(r4, &(0x7f0000000300)={0x18, 0x0, 0x1, {0xe86}}, 0x18) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0xfffffffffffffeae) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'ip_vti0\x00', 0x400}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:09:19 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xe00000000000000}}, 0x1c) 03:09:19 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:19 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x300000000000000) 03:09:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:19 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8906, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xf6ffffff00000000) [ 247.335003] hfs: uid requires an argument [ 247.339228] hfs: unable to parse mount options 03:09:19 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3f000000) 03:09:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x4, 0x80) socketpair(0xa, 0x1, 0xfffffffffffffe01, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r3, r4}) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'system.', "5b3a266367726f757023be2f00"}, &(0x7f0000000240)='securitytrusted\x00', 0x10, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:19 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00 \x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x8cffffff) 03:09:19 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x2000000000000000}}, 0x1c) 03:09:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:19 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8903, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 247.398129] hfs: uid requires an argument [ 247.402402] hfs: unable to parse mount options [ 247.525645] hfs: uid requires an argument [ 247.529877] hfs: unable to parse mount options [ 247.570883] hfs: uid requires an argument [ 247.575110] hfs: unable to parse mount options 03:09:20 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:20 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x300) 03:09:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="c79e6fc278b93e643ce2d7199c83a24bebbed707fdca3f4f430783c64deb6e453255872d91a28a15644763ee4abff97574036a1216e5e659aaa5f3d21d21c41e4ebb4d73040d242b4efd31e6b4e4d975092a1a0e8ea32cc77f8838e14be636c773c1a0657e5af8d287a84d5250f0f4e7d7cc040595ee0bb2e9811b2284077ad14f5c30293a4738948cc5748de62dca6662bb33f9aee995c6aedf63424d348a305eac71e61252308ab0d568a7eab28a87f9a933fd18ff6436c3a9dfa5f53eff05bb5619583f8c506ed2a3aadb62414c6fc39d13838124ae3e8b1077b9a762083709429b61da608f85877c55236d017583f5a3"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:20 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:20 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xc8050000}}, 0x1c) 03:09:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3) 03:09:20 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8982, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="68667304", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xfffffff6) 03:09:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) getsockopt$netlink(r1, 0x10e, 0xf, &(0x7f0000000140)=""/214, &(0x7f00000000c0)=0xd6) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314e02"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:20 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000000000000000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:20 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x891c, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:20 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3f00) 03:09:20 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x1000000}}, 0x1c) 03:09:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x200000000000000) [ 248.384491] hfs: uid requires an argument [ 248.388752] hfs: unable to parse mount options [ 248.453264] hfs: uid requires an argument [ 248.457513] hfs: unable to parse mount options 03:09:20 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x200, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000980)={0x0, @multicast2}, &(0x7f00000009c0)=0xc) accept4$packet(r0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14, 0x800) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000a80)={@mcast2, 0x0}, &(0x7f0000000ac0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000bc0)={@local, @empty, 0x0}, &(0x7f0000000c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002840)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000002940)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002b00)={'bridge_slave_0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b80)=0x14, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f0000002c00)={0x11, 0x0, 0x0}, &(0x7f0000002c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005500)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000005600)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000005640)={@mcast2, 0x0}, &(0x7f0000005680)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000005780)={@mcast2, 0x0}, &(0x7f00000057c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006ec0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000006fc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007000)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007140)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000007180)={@mcast2, 0x0}, &(0x7f00000071c0)=0x14) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000003c0)={@multicast2, @multicast1, 0x0}, &(0x7f0000000400)=0xffffffffffffff87) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000007540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007580)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007680)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000076c0)={0x0, @remote, @multicast1}, &(0x7f0000007700)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000007740)={0x11, 0x0, 0x0}, &(0x7f0000007780)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000077c0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000078c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007900)={0x0, @dev, @dev}, &(0x7f0000007940)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000007980)={0x11, 0x0, 0x0}, &(0x7f00000079c0)=0x14, 0x800) accept$packet(0xffffffffffffffff, &(0x7f0000007ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007b00)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000007cc0)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast2}}, &(0x7f0000007dc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008c80)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@local}}, &(0x7f0000008d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000008dc0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000008ec0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000008f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008f40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000009a80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000009a40)={&(0x7f0000008f80)={0xab4, r4, 0x108, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0xb8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r7}, {0x1cc, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x81, 0xffffffffffff8790, 0x5, 0x400}, {0x6, 0x4e, 0x644e945b, 0x200}, {0x8, 0x6, 0x7fffffff, 0xfffffffffffffe00}, {0x78, 0x10000, 0x10001, 0x5}, {0x7, 0x4, 0x400, 0x5}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4000000000000000}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x74}}}]}}, {{0x8, 0x1, r13}, {0x1b8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x8001, 0xd695, 0x7, 0x8}, {0x590f4fbd, 0xc7, 0x6, 0x8e7}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x274, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r26}}}]}}, {{0x8, 0x1, r27}, {0x14c, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7, 0x9, 0x9, 0x1}, {0x797, 0x1, 0x8, 0x8000}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r28}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r29}}, {0x8}}}]}}, {{0x8, 0x1, r30}, {0x16c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r33}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}]}}, {{0x8, 0x1, r36}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}]}}]}, 0xab4}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:20 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00@\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:20 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x2000000}}, 0x1c) 03:09:20 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4000) 03:09:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x100000000000000) 03:09:20 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x5452, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:21 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:09:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x8cffffff00000000) [ 249.101068] hfs: uid requires an argument [ 249.105378] hfs: unable to parse mount options 03:09:21 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8907, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:21 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x7}}, 0x1c) 03:09:21 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 249.165226] hfs: uid requires an argument [ 249.169590] hfs: unable to parse mount options 03:09:21 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4000000000000) 03:09:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x101ff, 0x2, 0xf002, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 249.358170] hfs: uid requires an argument [ 249.362391] hfs: unable to parse mount options [ 249.396134] hfs: uid requires an argument [ 249.400368] hfs: unable to parse mount options 03:09:21 executing program 3: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:21 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0xc0045878, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x300) 03:09:21 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x4}}, 0x1c) 03:09:21 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000380200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:21 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x8cffffff) 03:09:21 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101100, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000140)=""/182, &(0x7f0000000200)=0xb6) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$KVM_NMI(r3, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f6f"], 0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:09:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4) 03:09:21 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xf6ffffff) [ 249.950706] hfs: uid requires an argument [ 249.954974] hfs: unable to parse mount options 03:09:21 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:21 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x60}}, 0x1c) 03:09:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x800, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000140)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="67314ee3"], 0x4) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000001c0)) ioctl$KVM_NMI(r1, 0xae9a) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYRESOCT=r0], 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:09:21 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8983, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xffffff8c) [ 250.129840] hfs: uid requires an argument [ 250.134201] hfs: unable to parse mount options [ 250.181908] hfs: uid requires an argument [ 250.186265] hfs: unable to parse mount options 03:09:22 executing program 3: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:22 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000000009000", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:22 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x8040, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:22 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0xc0045878, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="02ee0800000045dcc9c770") getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x83, 0x4, 0x5, 0xfff}, &(0x7f0000000000)=0x98) r2 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x2, 0x4001) recvfrom$unix(r2, &(0x7f0000000b00)=""/4096, 0x1000, 0x2, &(0x7f0000000500)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1, 0xdc}, &(0x7f0000000240)=0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000ac0)="5a165c06d3d72c70", 0x8}], 0x1}, 0x8080) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000580)="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") sendmsg$alg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r4, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/92, 0x200002dc}], 0x1, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 03:09:22 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x9000000}}, 0x1c) 03:09:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4000000000000000) 03:09:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 250.816818] hfs: uid requires an argument [ 250.821050] hfs: unable to parse mount options 03:09:22 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x290000, 0x1c0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 03:09:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x40000) 03:09:22 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x890d, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:22 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00?\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:22 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xa00000000000000}}, 0x1c) 03:09:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 250.871449] hfs: uid requires an argument [ 250.875693] hfs: unable to parse mount options 03:09:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000)=0x752, 0x4) listen(r0, 0x9b81) listen(r0, 0x0) 03:09:22 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x1210002, &(0x7f0000000100)="3f409ccbf8673c9aa3") umount2(&(0x7f0000000180)='./file0\x00', 0x0) prctl$getreaper(0x28, &(0x7f0000000040)) [ 250.974628] hfs: uid requires an argument [ 250.978860] hfs: unable to parse mount options [ 251.039539] hfs: uid requires an argument [ 251.043793] hfs: unable to parse mount options [ 251.062632] proc: unrecognized mount option "?@g<" or missing value [ 251.085393] proc: unrecognized mount option "?@g<" or missing value 03:09:23 executing program 3: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:23 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:23 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x5451, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3f000000) 03:09:23 executing program 1: keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xfffb, 0x1a, 0x1, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r1, 0x0) r2 = dup(r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000300)={@remote, @multicast2, r3}, 0xc) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 03:09:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:23 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x80, 0x1, &(0x7f0000000400)=[{&(0x7f0000000300)="f70ff77456e709295f43285137684bd3215284af16ffa03f4e3f6f17c11b55a7a38b7c90dcfbe6aa64a8cd7102e49abcfd6366c2da715cbf25d15b53edb5062be4801b4a5de593d53b373993cb163f30e189c868a6b025c7b6e1f307c92add2c4f4b1c11ef4cdcb076ee25641822acf39362cd66cea169f4dc60457b33c0896b082f51e3c7df5ce377d33df6ac2e0a76003ccf0cbf2b71da4425f7be6f65ac66004d979ee6281ac089dba1632247c7004072da81c19214d518c114eb7080dc9a5627821e0063b613cbc20f1d676f6e9df4e488b3596c58e9e5d7e3507b003fdd96859a27d482791d15df92", 0xeb, 0xff}], 0x100008, 0x0) clock_settime(0x5, &(0x7f0000000240)={0x0, 0x1c9c380}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8400, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000200)={0x34, 0x0, &(0x7f0000000180)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000100)='net/fib_triestat\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0x800000000002) 03:09:23 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x900000000000000}}, 0x1c) 03:09:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x40000000) [ 251.686909] hfs: uid requires an argument [ 251.691133] hfs: unable to parse mount options [ 251.707408] proc: unrecognized mount option "./file0" or missing value 03:09:23 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8934, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:23 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x1395c1, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x8, 0x7ff}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000400)={r1, 0xffffffffffff7a5e}, 0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400) openat(r2, &(0x7f0000000100)='./file0\x00', 0x181001, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x402800, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000002c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) 03:09:23 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x6000000000000000}}, 0x1c) 03:09:23 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 251.766201] hfs: uid requires an argument [ 251.770490] hfs: unable to parse mount options 03:09:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40180, 0x0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) ioctl$TCFLSH(r1, 0x540b, 0x7fffffff) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc8ff0000018f764070") syz_emit_ethernet(0x89, &(0x7f0000000180)={@broadcast, @local, [{[{0x9100, 0x1, 0x4, 0x2}], {0x8100, 0xff, 0x100021e7, 0x4}}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote, @broadcast, @remote}}}}, 0x0) ioctl$TIOCEXCL(r1, 0x540c) 03:09:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x300000000000000) 03:09:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 251.886431] proc: unrecognized mount option "/dev/mixer" or missing value [ 251.933431] proc: unrecognized mount option "/dev/mixer" or missing value [ 251.947502] hfs: uid requires an argument [ 251.951734] hfs: unable to parse mount options [ 252.022951] hfs: uid requires an argument [ 252.027170] hfs: unable to parse mount options 03:09:24 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:24 executing program 1: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffffffa) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00fa04"], 0x3) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) fstatfs(r0, &(0x7f0000000100)=""/116) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000080)={0x80000000, 0x6, 0x214, 0x0, 0x81, 0xfffffffffffffffe}) r2 = syz_open_pts(r1, 0x0) ioctl$TCXONC(r2, 0x541b, 0x707000) socket$inet6(0xa, 0x1, 0x80000001) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x4, 0xfffffffffffffe00, 0x3, 0x2, 0x2, 0x1, 0x8001, 0x8, 0xffff, 0x1, 0x0, 0x81}) 03:09:24 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000300", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:24 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x3000000}}, 0x1c) 03:09:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x2000000) 03:09:24 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8918, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:24 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount$9p_xen(&(0x7f00000000c0)='proc\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1044, &(0x7f0000000300)={'trans=xen,', {[{@mmap='mmap'}, {@access_any='access=any'}, {@privport='privport'}, {@mmap='mmap'}, {@access_client='access=client'}, {@afid={'afid', 0x3d, 0x1}}, {@nodevmap='nodevmap'}, {@cache_loose='cache=loose'}]}}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x88000, 0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)={@multicast2, @empty, 0x0}, &(0x7f0000000100)=0xc) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$xdp(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x1, r1, 0x33}, 0x10, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x4}, 0x4800) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="68667310", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:24 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000000)=0x6b) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1, 0x1}, &(0x7f0000000180)=0x8) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='{'], 0x1) mmap(&(0x7f00001b8000/0x13000)=nil, 0x13000, 0x48000000003, 0x8012, r0, 0x0) 03:09:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x1000000) 03:09:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:24 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000023800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 252.559719] proc: unrecognized mount option "proc" or missing value [ 252.592515] proc: unrecognized mount option "proc" or missing value 03:09:24 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x900}}, 0x1c) 03:09:24 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='autofs\x00', 0x89, &(0x7f0000000240)) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80000000, 0x8000) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:24 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x2, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pread64(r0, &(0x7f00000002c0)=""/4096, 0x1000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$getenv(0x4201, r2, 0xfff, &(0x7f0000000000)) socket$inet6_dccp(0xa, 0x6, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000030707031dfffd9402a2830020200a000900e000001d85680c1baba20400ff7e28000000510affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2006b20cd37ed01cd8", 0x4c}], 0x1}, 0x0) [ 252.746004] hfs: uid requires an argument [ 252.750457] hfs: unable to parse mount options [ 252.772114] autofs4:pid:20132:autofs_fill_super: called with bogus options [ 252.801465] proc: unrecognized mount option "./file0" or missing value [ 252.816210] autofs4:pid:20140:autofs_fill_super: called with bogus options [ 252.822513] hfs: uid requires an argument [ 252.824712] proc: unrecognized mount option "./file0" or missing value [ 252.827454] hfs: unable to parse mount options 03:09:25 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4000) 03:09:25 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:25 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xa00}}, 0x1c) 03:09:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0xf503}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c0000000000001300000005000900", @ANYRES32], 0x1c}}, 0x0) 03:09:25 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8904, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:25 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000040)='./file0\x00', 0x8) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x800, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x800, 0x40, &(0x7f0000000140)) 03:09:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3f00) 03:09:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$rds(r0, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x4e24}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/110, 0x6e}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000180)=""/61, 0x3d}], 0x3, &(0x7f00000005c0)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000004c0)=""/132, 0x84}, &(0x7f0000000580), 0x28}}], 0x30, 0x40}, 0x4000010) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c460704ece4003e000900000034030000380000009e02000089610000000020000200ffffa306a56b0000000051e57464000000002c0700000800000007000000f6d80000040000008ac700000b410000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b1c5fa2af912690000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x25a) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0x8010aebc, 0x0) 03:09:25 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x4000, &(0x7f0000000540)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030372c6d6f64653d30303030303030303030303030303030303030303030332c6d6fc131d15674309f4557c4ff64653d30303030303030303030303030303030303030303037372c6d6f64653d303030303030303030303030303039b4719410e8e12fb51ee66a812d7a0ced87437f9757e7f69c450a869a0f37667930fe46dd42c5eb66fca641176e0be60c7acc12dcebd02d3a6b74bb74cbd5014e2033bb6c875c4f4512467a5dd933941ff160f7832fac741e29eb8e615641aed3b9daed81708ee536245f05bfa3bbd2cc58273bd9e69f0d5766edb5ab860040498f7ecbe9a53b7c1cefcb0b9b1028d0d98c841304716f5683526b2ceeba627490bbaa1b407504d27131d2400b7727f085e5a3366ca11ca145016c7cb0bac99df9889ca1ffa66ce81af480c804d44e2d7843e5a46b9f8c7f2be003d945507212e683b009a085301827f178316765caf7e78bf66e5e2401902f3f95231cd16390e0d9d89bc17b53e26ddafecbd775effcb432b68491209479396f1186e3bb85066072335695fd1fe330aa544712e35c2a688cccdf0443e6988a5fff91286db68b5c4f2992362d4f979b91000000"]) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='ocfs2\x00', 0x1000000, &(0x7f0000000440)="846be0f1055b0c76e7a3e8ca4fc556c51a0a659b179a8fdf40a3fac6acae89e07cb28a820babdbc92affc7acc84b29a42567b8088a6088285ec65dc7270147f39a260680a5af76d8621202a0e0929c5fec373594db7e344fbebe1b58f39676eba9ccbcb2a5e02fdfde5d6dc5ccd3d6a376736d5acee60f629b1d6574b83c15363a4cea3a7d4c96872a7bcf4c63cc5613829ebc399bfe64a528c135186b451a701aebc8294fe7168ec0c207528117769426ab67d6a3ff97a8066bbbce5cf757dc839a4a532dfde9dcbb312084a267cfb2f5a35be9388805358b65e95cfe56bf8ecad89a13886d268fefb47fb17ee28c3b507da78374fd") 03:09:25 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8915, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:25 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000009000", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 253.432228] hfs: uid requires an argument [ 253.436462] hfs: unable to parse mount options [ 253.465567] hfs: uid requires an argument [ 253.469926] hfs: unable to parse mount options 03:09:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673ff", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:25 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x5c8}}, 0x1c) 03:09:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 253.612313] proc: unrecognized mount option "ocfs2" or missing value 03:09:26 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:26 executing program 1: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffe, 0x800000000008031, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) mbind(&(0x7f000037a000/0x1000)=nil, 0x1000, 0x7ffd, &(0x7f0000000040)=0x4, 0x2, 0x4) mmap(&(0x7f00002b3000/0x3000)=nil, 0x3000, 0xb, 0x850, r0, 0x0) mincore(&(0x7f0000a13000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/26) sysinfo(&(0x7f0000000180)=""/172) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x20044, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x1) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x10000, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) personality(0x2000000) write$tun(r1, &(0x7f0000000240)={@void, @val={0x2, 0x3, 0x8, 0x100000001, 0xfffffffffffffff7, 0x81}, @ipx={0xffff, 0x7c, 0x1, 0x15, {@random=0x1f, @current, 0x4}, {@broadcast, @broadcast, 0x8}, "e48fad9609b896319e15f7f59f41ddb7b2f4f44edb14fb4709ab5bbd7577efd3e1c82ffdee5f102d83b0ff404909344f9f2fa4d47130b5e3653d9a957be26a006fe631f627d271144782857a279f6b46932260396e474f9cb484d4636906"}}, 0x86) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 03:09:26 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000000000000001100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:26 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x5460, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:26 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xffffffffffffffff}}, 0x1c) 03:09:26 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0xb25) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x4, &(0x7f00000001c0)="f03f7f36bab63c9c069220ea831117845b80a6a704a8e5cc3dc14aaa3dffea3273ffb3bccaaad9c352adc47ac186c843d3c5b6aabf76fcc4e4210d1124d348617fd3a3b0899fa4ff6c587079e2f898261219153cd33865f9aafc2b2018b99f8b81276eedaaf75cb8ddd1154bb9b8341e8583b553fd71f9012087c0ddf90a7dc03620ddf016193233e6c5f6e6") umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3f00000000000000) 03:09:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 254.325932] hfs: uid requires an argument [ 254.330172] hfs: unable to parse mount options [ 254.336405] proc: unrecognized mount option "?6< [=J=2sʪRzCŶv! $HaӣlXpy&<8e+ 'n\K4Sq [ 254.336405] }6 23" or missing value 03:09:26 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x60000000}}, 0x1c) [ 254.372129] proc: unrecognized mount option "?6< [=J=2sʪRzCŶv! $HaӣlXpy&<8e+ 'n\K4Sq [ 254.372129] }6 23" or missing value 03:09:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x4000000000000) 03:09:26 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:26 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8935, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:26 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0xdc74) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f0000000200)="0c87cc16bee0042368f9cae0bfe31503facdb9233077ac3d8bdc25551ddc0bf8d5dea2dc479cec226707da32f01a6997dfaaa15bf0ad309500866a96da9e555932a9eee0e7c749bcced9a289") ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x200000) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000400)=0x1) umount2(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000140)=0x1) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r1, @in={{0x2, 0x4e21}}, 0x10000, 0x7}, 0x90) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f00000001c0)={0x40, 0x1}) [ 254.423978] hfs: uid requires an argument [ 254.428247] hfs: unable to parse mount options 03:09:26 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x9}}, 0x1c) 03:09:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfsl', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x3000000) [ 254.555578] proc: unrecognized mount option " #h͹#0w=%U ޢG"g2iߪ[0" or missing value [ 254.623456] proc: unrecognized mount option " #h͹#0w=%U ޢG"g2iߪ[0" or missing value 03:09:27 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:27 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x3}, 0x2c) r1 = msgget$private(0x0, 0x10) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000740), &(0x7f0000000780)=0x4) msgctl$IPC_RMID(r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 03:09:27 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:27 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8919, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:27 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'veth0_to_team\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="f0000000", @ANYRES16=r1, @ANYBLOB="00002dbd7000fddbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="8c0002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r3, @ANYBLOB="400002003c0001002400017478516d6574686f640000000000000000000000000000000002000000080003002c45751498da0b24ebbcf258ca72e8050000000c0004006861736800000000"], 0xf0}, 0x1, 0x0, 0x0, 0x40010}, 0x54) socket$key(0xf, 0x3, 0x2) 03:09:27 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) 03:09:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0xf6ffffff) 03:09:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x34ba, 0x410000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x7f, 0x4) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000140)={@rand_addr, @multicast1, @multicast2}, &(0x7f00000001c0)=0xc) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:27 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x40023, &(0x7f0000000200)={@rand_addr, @loopback, 0x0}, &(0x7f00000001c0)=0x3b3) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000002c0)="2f04e6d5b6ab9b4908ab677dbb6739826a9e7954ec9d9403961b063a67f38201feaae4ef3079f2c70bca62f98552da83eee91a5be6eb5b7f3ca2e2a2c18ec4a8003334658ed5dffe396c6b13b4af429c1a82884ab15ba40b5394260e78cf59192502284e8198ffb0c575e674e22d9d0297260f660ba9803fdaa7ed9cb67ab419a9c7070046ff3290d6b9e16d9ba6c6163cd303cb09b33d711e0cb75d0bdfd9396f798410a39c712f6aee1f3ee9ec35d7d31989725f016637b281040c11f1b729dc8c09c3c7df33c62fd0405500820e0ea8f90c6be3296b8b0d137715b1f77e44f0e83ae383c4b7182d68a880c3f31d6b0e61ac11c46e2c5033343168c083c1cb") write$binfmt_misc(r0, &(0x7f00000003c0)={'syz1', "31abdb06ca5e845e9a7ae0cab59234585770e86a265756eabf5c64d4b70f1727c564755794b48ec5e35a42764b840ff71f5dc3600240b044e6963dc3cde7c2a1b82d512e27500bf9c85dcee3a5b64603151a32443cbf64814b45df141cbd934fcca1c5f918c7a53e8d13754bc4a1adf50c074a35959b67943439276b66351209b9f9de36caccdfdc9b77bc4b9f368d2e580ce18130c450095939268378cbd088f1d43f8ded69be3371817b2b6adbd2206d62a80098395666ccc2b7972dae84d18c91a2b891218fd92bf15c61b167b850d93ff2d6e1a2a2337ff5dad9244320e0ea25c683aeed2475bb103630be1b257242a2702a15981d6447"}, 0xfd) fchdir(r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', r1}) ioctl(r0, 0x7, &(0x7f0000000140)="b927a0a213a19df661") [ 255.332404] proc: unrecognized mount option "" or missing value [ 255.342125] hfs: uid requires an argument [ 255.346505] hfs: unable to parse mount options 03:09:27 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000300", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:27 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xc}}, 0x1c) 03:09:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x12080, 0x84) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000300)={0x80, 0x9, 0x8000, 0x1, "06711a61b5de03c7c746e73ae4f35792e9d6351329df74cf0d6ffe8f3e34f702"}) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={0x0}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440)={0x0, 0x2}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={r1, 0x6e, 0x9, 0x7, 0x7, 0x7, 0x7, 0x9, {r2, @in={{0x2, 0x4e23}}, 0x8, 0x7fffffff, 0x2000, 0x100000000, 0x9}}, &(0x7f0000000580)=0xb0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x9) socketpair$unix(0x1, 0x20000000005, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x7, &(0x7f0000002000)={0x1}) getpeername(r4, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000140)=0x80) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000200)={r6, 0x9, 0x10}, 0xc) unshare(0x400) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000340)={0x8, 0x2, {0xffffffffffffffff, 0x0, 0xf92e, 0x3}}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x1e, 0x9, 0x7ff, 0x7, 0x11, r5, 0x6}, 0x2c) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10302, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r7, 0xc05c5340, &(0x7f0000000240)={0x101, 0x80, 0x4, {}, 0x9, 0xfffffffffffffffa}) fcntl$lock(r4, 0x7, &(0x7f0000000080)) dup3(r3, r7, 0x0) [ 255.394608] hfs: uid requires an argument [ 255.399004] hfs: unable to parse mount options 03:09:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:27 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x10001, 0x20000) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000100)=0x44) [ 255.453452] proc: unrecognized mount option "" or missing value [ 255.483474] proc: unrecognized mount option " " or missing value 03:09:27 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00?\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 255.527686] hfs: uid requires an argument [ 255.531960] hfs: unable to parse mount options [ 255.555068] hfs: uid requires an argument [ 255.559343] hfs: unable to parse mount options 03:09:27 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:27 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8902, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000040)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000080)='./file0\x00', 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x40000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1001005, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@posixacl='posixacl'}, {@version_L='version=9p2000.L'}]}}) 03:09:27 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x3}}, 0x1c) 03:09:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x40000002) mount(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000002c0)="e98f8a8e6467d622cf424a4a9930206cab30426680f529cf4495b05b5a9703bf7f6aa2282d772dd132affd2d31aeeaecf724601094676e8cfa3c1510432564f2eb790f7cf71eff07fdfada9882ed32f0f9001e692e5c61741a07c01293cab8dd2ce114a84572105438e7a515fff5286a65a5296fe5f650e1c17bdca2f879ea7cc1b5508c0243ca464ad944046d9b23fb49d499a98fbf825d24c4a67c3b06504641d3fe79d84c631b3b6a3cea7a440600000000000000000000000000000000000000000000") umount2(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x10000, 0x0) getpeername(r1, &(0x7f0000000200)=@generic, &(0x7f00000003c0)=0x80) linkat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x1400) 03:09:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:27 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 256.115998] proc: unrecognized mount option "鏊dg"BJJ0 l0Bf)D[Zj(-w-2-1$`gn<C%dy|ژ2" or missing value [ 256.131739] hfs: uid requires an argument [ 256.135944] hfs: unable to parse mount options 03:09:28 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:28 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x1500}}, 0x1c) 03:09:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="686673fc", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 256.159121] proc: unrecognized mount option "./file0" or missing value [ 256.170575] proc: unrecognized mount option "鏊dg"BJJ0 l0Bf)D[Zj(-w-2-1$`gn<C%dy|ژ2" or missing value [ 256.186978] hfs: uid requires an argument [ 256.191243] hfs: unable to parse mount options 03:09:28 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000500)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1}}, 0x18) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)=0x0) sched_setattr(r2, &(0x7f00000005c0)={0x30, 0x6, 0x1, 0x7, 0x3f, 0x5}, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000003, 0x40017, r0, 0x180000000) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000540)=0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0xfffffffffffffffd, 0x0) readlinkat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=""/131, 0x83) 03:09:28 executing program 6: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getpeername(r0, &(0x7f0000000040)=@ax25, &(0x7f0000000140)=0x80) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") syz_init_net_socket$llc(0x1a, 0x1, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:28 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000001440)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000011c0)=[{&(0x7f0000000040)="7f"}], 0x1, &(0x7f0000000000)=ANY=[], 0x0, 0x80000000}, 0x0) munlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 03:09:28 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x891a, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:28 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:28 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x4}}, 0x1c) 03:09:28 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) read(r1, &(0x7f0000000240)=""/134, 0x86) dup2(r1, r3) 03:09:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) flock(r0, 0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) recvfrom$llc(r1, &(0x7f0000000200)=""/119, 0x77, 0x40000000, &(0x7f00000002c0)={0x1a, 0x30e, 0x4, 0x1, 0x5, 0x7fffffff, @broadcast}, 0x10) ioctl$KDSETMODE(r1, 0x4b3a, 0x7) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x1, @empty, 'rose0\x00'}}, 0x1e) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt(r0, 0x5d, 0x20, &(0x7f0000000100)="7a8759f085336c8843951ae0e70c75bf00780d3ed3113ece38ac964405b27997894e5275d71d5c8964e52c7b63b7dc3124e6a3b5f6c98631d2623d1bce85d73fb0e9d1e7088e9720d421dd9ff1c4025fd9ddb514e1f3bb2f25d2df3d1e", 0x5d) 03:09:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffffa4c301"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x3, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f00000003c0)=""/154, 0x9a}, &(0x7f00000000c0), 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 03:09:28 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8917, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:28 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x200000000000000}, 0x1c) 03:09:28 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000000000000000400", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 257.011789] proc: unrecognized mount option "" or missing value [ 257.034848] hfs: uid requires an argument [ 257.036933] proc: unrecognized mount option "" or missing value [ 257.039089] hfs: unable to parse mount options 03:09:28 executing program 1: migrate_pages(0x0, 0x9a8, &(0x7f0000000040), &(0x7f00000000c0)=0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x7ff, 0xffffffff, 0x0, 0x6, 0x0, 0x3, 0x1000, 0x9, 0x7, 0x3, 0x90, 0x5, 0x2, 0x7, 0x1, 0x7fffffff, 0x100000001, 0xc8, 0x5, 0xffff, 0x0, 0x0, 0x9, 0xfffffffffffff114, 0x2, 0x7ff, 0x4, 0x80000000, 0x4, 0xae51, 0x8a, 0x4, 0x637, 0x4, 0x100000000, 0x3, 0x0, 0xff, 0x1, @perf_config_ext={0xfd3, 0x6b6a4f7a}, 0x4000, 0x7, 0x4, 0x3, 0xffffffff, 0x80000001, 0x10001}, r0, 0xd26f, 0xffffffffffffffff, 0x1) 03:09:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) fcntl$addseals(r0, 0x409, 0x4) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0x100000001, 0x1) 03:09:28 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x200001, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:28 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x700000000000000}, 0x1c) 03:09:28 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000023800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:29 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x40049409, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 257.136618] hfs: uid requires an argument [ 257.140850] hfs: unable to parse mount options 03:09:29 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10000, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000140)={0x9, 0x800, 0x1, 0x7, 0x2}) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") sendto$inet6(r0, &(0x7f00000002c0)="27e6ab206d6cdc511d79695a9cc6387a7777c04a1414bd5ccf27b77d2800411e73c6138726fc3d6c3f409260bd9b9607bfd17de0c7fd2407ab847a3d01924610d0232d588f37bbfbc7793a895d78018adf5fa245f61645c8587aab4ee2026dee720fb21835e43fa81dd8f7ed422d746fb9face6cb53ab4cbac4d412d3a8204a8cc4273e35fb85c53637d3f9457b558f2b69557dda8910370abc104035394462ffd17cad02c211a6010d550db5bf835161b2ef3c782b7366ed7e58b3def736a41278b86f82f8b5b791c7a897e87a467a7f91933c37626d63e15408e9540dc0c299da5ef9dd2a654", 0xe7, 0x50, &(0x7f00000001c0)={0xa, 0x4e20, 0x9, @local, 0x2}, 0x1c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 257.266583] hfs: uid requires an argument [ 257.270817] hfs: unable to parse mount options [ 257.294821] hfs: uid requires an argument [ 257.299279] hfs: unable to parse mount options [ 257.327137] proc: unrecognized mount option " [ 257.327137] " or missing value [ 257.347979] proc: unrecognized mount option " [ 257.347979] " or missing value 03:09:29 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:29 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) getpeername$unix(r0, &(0x7f0000000100), &(0x7f0000000080)=0x6e) futex(&(0x7f0000000d40)=0x1, 0x0, 0x2, &(0x7f0000000d80)={0x77359400}, &(0x7f0000000dc0)=0x1, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x800, 0x0) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x577b, 0x6, &(0x7f0000000840)=[{&(0x7f0000000400)="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", 0xfb, 0xff}, {&(0x7f0000000500)="d2f692025067b49df511ae12a31c141539967ee557ad79bba6fbfca4a58b2bee2435fcbcb0f65008a3cb2c2308ef338dafd6fcceec30b2875f37f890231026eb37b5024c9fe53b48444df13f7609270116506c", 0x53, 0x6}, {&(0x7f0000000580)="58082f80d0011171521b8be301033bbc75a9a01a264917ecfb78e283acfd25e6570a500c1d48157d4cefd9272c16c0ed2668ac2d5e5c9255930234c83450c478a970a1390964f2c71914b65d2719e9e1c45e6d85682ec9359b321988abee53035ea7845a3b0138e21dd00b4142db829d7d555c53a6e2ad26d11f30b18e96dc793ed4fa6ca3b27435252bb1defff3edbef497020b80156a9cf7d08d0e167f603dd6c1b4692cf2ccdd8c2c5e5da3514d6d9b3ca82a27258e29ee9b5c0221f0046793d03bba0da76dc75f420d579113f9db86a25040f2efef2684f5af2f3dcb20d7f01238919a944adb1b6294441162ddd730f4c0", 0xf3, 0x3}, {&(0x7f0000000680)="76b4aeec14d9cccac2ed37c59755f6dbbee563755ff1b6a83d31da02db9d4301fd247e721e75775a4a2c4b64400633d3db32d50a9228dfa269dca8bfa967d2c3395b7ee723113c557e154ac98f8082b57e75bc9d420517b160ba71781879f185783e7ae7f9bdaa7850ec96c8334ca2265adcb7d4b390497276099d4ae76eea9d", 0x80, 0x6}, {&(0x7f0000000700)="e5c89877a3e1c933a51a6b19f75e4245df1877649eebf164d1ffd24629ab0770bbf2e8ea456c75507581e4814be9dd5c05406264a8c3cf394f73e2d40dd19a9789ea7a0686c73c7b5bb59cac420beae57f588eaeb80f545593858f0dcf0c7a0ad399687e93c8be2dd8cbcd0fccdc2d62873e24264b0b4ff79d1f82d59e58868230927fd554a870d6739782c71c638909ea7bdc65094cdad1ec74c01593dc3105edb34de2bc05f100d23fbdad1acf7ac141a37e531b7ff1efdc2fa1c8638891f25fd7328cecceabe01cd510d841ba30675e2d95f51e71caa6d1ef7720c57598365d20e1e08a728989cb0c10", 0xeb, 0x8}, {&(0x7f0000000800)="53196a12e0e020471a08de88b5f99ae753c38327e65f64bad9772fa32dc10b124e74c5d500731ec6a74e334e4822bbef4fb9", 0x32, 0xe85}], 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="646f62732c6e6f64d8192f6f12e0afb62c00"]) statx(r1, &(0x7f0000000200)='./file1\x00', 0x4100, 0x7ff, &(0x7f00000002c0)) syz_mount_image$minix(&(0x7f0000000940)='minix\x00', &(0x7f0000000980)='./file0\x00', 0x3ff, 0x4, &(0x7f0000000cc0)=[{&(0x7f00000009c0)="561f7f2416e9543715df47cdad6975634c7be54e3bd8e764235453fa526b84897bbe366e0dc2f938ff6a9c73ffa8335a24a959db264b3d6a3949f28d523ed82c84c97ddf79f0a6f41e6d3baafd7a3699c50ef384e90c67f09dbbb69773b0b9a2312e8217a7a6d50c8c8f038dd5acf41784c7eeedebe6ef51b254db0feeb0c9cc0a3fc4e5dac66568225498dba9ef4cb060938abec45593fd32201accbab5c7c1818fd4da9525674ede9a52bce2660fcc8a", 0xb1, 0x2}, {&(0x7f0000000a80)="9a107d8064cf52e614f4234ddde91bddd83c502f6c42d04d3228f335f516c63efd619163bf8f6480f6d3441d0bd1904d3a6c4f0a2b29877ccf3ef725301767ff3f618505f63686bfd8d246845340e0cb855331b661078718e74e5e96962434d43affad56eaaf769c1a7db894ddac7d1ec77c9ab9f1e643d056894d045f191433b52be755e1e075f9a9dc092aa5c503a843ab9bad9b51217727a0669d8bb1138830de9873c17139f5914e61bb3590d3f2e7492b6a6fa7c7064c27c03c512321b0a8a5f40e975693d9cde351d7bbca1948778fd67a271b3da766ec8c15633e604896fba229ed831ac6c047e35ba7214d5f7e780e", 0xf3, 0x4}, {&(0x7f0000000b80)="3641a567b6c62a54022c7d0ec1d367e20b48764b5f4920353e8ed19be3c042c34495ecb1667b0d3cb06fdd1b3beeb16a0838cb76af462e9c2bf68681305a0b52e54b64e3806ac6aa5a4e2f959eb31147dc4f5365af3a1d32927af018d717a607f3da250c083a7bb2d916b4de4767ecd2c1c58d39c3e640e78874732cea239563c1ccebe225ce380d16364c28f5c3fc4f3c407c71a2adfc68ce8b55a7551621e450777658e002e363f06f594e454dd3ce47208b", 0xb3, 0x1ff}, {&(0x7f0000000c40)="212be69c420d34b0f60e7737153c9c26bcdb2b51810b5d2e4a141d5ab01342680e3f8aeefe763d2dfd07078482c08264cd65f36a2c30696c8e53e4546603364c2667b9b48bce3a6744b4893efc3a2ea6f9d5d237b9e2b8594d0d8cd3b7e405b952bab6ebecaa", 0x66, 0xfffffffffffffffa}], 0x180000, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x28912, &(0x7f0000000280)="025cc80741145f8f764070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000000000000010000000000000018000000ff"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x485]}) 03:09:29 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000001100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:29 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xa00000000000000}, 0x1c) 03:09:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:29 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8941, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) getsockname(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, &(0x7f0000000140)=0x80) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:29 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000000000000000500", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 257.883797] hfs: uid requires an argument [ 257.888049] hfs: unable to parse mount options [ 257.900386] FAT-fs (loop5): Unrecognized mount option "dobs" or missing value 03:09:29 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x89a0, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:29 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x300}, 0x1c) 03:09:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = geteuid() r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240)=0x1, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f00000001c0)="41b3de823cc2d936ad0e46815273b05753231aef7879e42c65ad78e9ab0b15ba61c243b1d6ca0414b9a662057d5246be87fd383cf82b19a65ef10bab92f47e03d5726c7f8198ea5f5484679caa49", &(0x7f00000003c0)=""/120}, 0x18) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x1c}, @in6=@remote, 0x4e22, 0x2, 0x4e20, 0x1, 0x2, 0x80, 0xa0, 0x2f, 0x0, r1}, {0x200, 0x1f, 0x0, 0x9, 0xd92, 0x9, 0xb739, 0xfffffffffffffffe}, {0x5, 0x400, 0x8, 0x2}, 0x40, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4d6, 0x33}, 0xa, @in6=@dev={0xfe, 0x80, [], 0xd}, 0x3502, 0x0, 0x3, 0x1ff, 0x6, 0x40, 0x6}}, 0xe8) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x2000400, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x2000000}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x4e}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {@mode={'mode', 0x3d, 0x8001}}]}) listen(r1, 0xddd) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)={0x0, 0x0}) prctl$setptracer(0x59616d61, r4) sendto$inet6(r3, &(0x7f0000000300), 0xfd5e, 0x0, 0x0, 0xfffffffffffffe48) [ 257.935355] hfs: uid requires an argument [ 257.939712] hfs: unable to parse mount options [ 257.966624] proc: unrecognized mount option "/dev/sequencer" or missing value 03:09:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfsh', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:29 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000300", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:29 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='ocfs2\x00', 0x4, &(0x7f00000001c0)="a55d216276b071933a46617093d9a2ec5eedd4828c2d14eff32bd5cab739ab883795a7d161d65e34222cddb6afe949404a4a65101698c7011afaa1125c742d3eb4b0f58e0dffab82dbcf10bd485e") uselib(&(0x7f0000000240)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='aufs\x00', 0x40000, &(0x7f0000000140)="916b") [ 257.999887] FAT-fs (loop5): Unrecognized mount option "dobs" or missing value [ 258.095780] proc: unrecognized mount option "Aނ<6FRsWS#xy" or missing value [ 258.132020] proc: unrecognized mount option "Aނ<6FRsWS#xy" or missing value 03:09:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:30 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x6000}, 0x1c) 03:09:30 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8914, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:30 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f0000000040)='./file0\x00', r0, r1) 03:09:30 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:30 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xfffffffffffffffd) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x37a, 0x400100) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x9, &(0x7f0000000040)=[{0xc66, 0x6}, {0x100, 0x401}, {0x7fffffff, 0x7}, {0x6, 0x1}, {0x33, 0x1f}, {0x2, 0x1}, {0x6, 0x100}, {0x8, 0x5}, {}]}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\n', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:30 executing program 6: ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 258.769452] proc: unrecognized mount option " " or missing value 03:09:30 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x7}, 0x1c) 03:09:30 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x220040) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x19, 0x0) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x44, &(0x7f00000002c0)=ANY=[@ANYBLOB="75e5f55872616e733d66642c7266646e6f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',privport,cache=loose,access=client,fscache,noextend,version=9p2000.L,loose,\x00']) accept4$nfc_llcp(r1, &(0x7f0000000380), &(0x7f0000000240)=0x60, 0x80800) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x2, &(0x7f0000000200)=0x1) 03:09:30 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c74657200000007fffffe00", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:30 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0xc0189436, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x4) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='hugetlbfs\x00', 0x0, &(0x7f0000000200)) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffd, 0x2) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x1, 0x0, @pic={0x8, 0x7f, 0x400, 0x5, 0x5, 0x4, 0x3, 0x5, 0x9, 0xe2, 0x80000000, 0x5, 0xb8a, 0x7f2, 0x1da, 0x7}}) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02630440000000000000000000000000000000195537464bbfb1786bba52e14316000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[], @ANYPTR=&(0x7f0000000600)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f00000007c0)}) 03:09:30 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00\a\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 258.927335] proc: unrecognized mount option "" or missing value 03:09:30 executing program 5: lremovexattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100)=@random={'btrfs.', '\x00'}) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:30 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xa}, 0x1c) 03:09:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:30 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8901, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:30 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 259.004878] binder: BC_ACQUIRE_RESULT not supported [ 259.016591] hfs: uid requires an argument [ 259.020938] hfs: unable to parse mount options [ 259.021976] binder: 20657:20659 ioctl c0306201 200002c0 returned -22 03:09:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="6866737f", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={r1, 0x1000, "56f45c729957e3506714ec29bdd3c7fe22b2056c37df758bafd3ee7658976cfcd267f55db42b48f0a76a654652099346f49ace87f7053d6960f5f8f631d7e7cc69153e3768ae56164c3ab471c0cbc952d4bd25b12080ddf9bb5886cc2de418bfe7b90e64d7c8ff7ce992ffa02dfaf82f2a231d23e912513404a0490d03bf9a9c9ea7b4822841ea85925a21572011604eb7a5ee4cc097be10bd1a155dc257ead862935ce5216fca618e004ac38765ca810e3d5f68351ef93946e1ad126fc0291b006f74d4d4fcd1a092e5f8ff7141c899b2c8bda96066fd838fef030873b0b3f5408ca996d551a5b182812eb91d9ef42b444de6eebc241bbebf5e13b52a5bf56405fe2638ead006e091169088f9cbfc529b059b6fbc931b52ec70e203ad578ca55220b0d181290ddd23ca56052009dfb54d56e668ae832b93f7f99cd98852d0a3b551578c0c872ec321174c34c07ab5ef125a2f0d3479859f77d2bd719f6005c355847e830df6189abffb1087090e173feb1278324e034caddda8dd118fb9cd890cd9d83a08d53df49afccbb6d0eaf1f25f3c7bcb2636bef96f8b110a0418c76087b7b1da7047a7a6c44a7d921f82360024ed14f313999246665bd066f35d986ff02320d254f39fd958b98ac24e774d5833fc05c22df73ade8036288823fd1e37d9f042d216fd72c045c9976b7ad22e1bed783630b42bcbea9a84c6e3aed5a81ed1061fff6aa3243ee4d49497e61a43bf7ae8c7787796e3e8041e1b51cffa9365bac0fe65c3f609916f01f2e608c439a48a19a2442ea5cee4873d2d030146f02bae375718e585eb8c78d2577a506b71b42c851f5c30a017852a3987cbb923250ce46fcdc86417caedb364fc7a44675e27755bf0b5638381c76eae72681f760be9a7e1702d5e96f4f31842ef2f1b22ffc123db61cf3f453e9eea92f2fc8db7b75a079e73e3797d4d0b3324fdd1d5ce6a9b1dad68d25a4e4163ff4a16aa7637421eba3351ebbb12167bd866fbfe61eb8dc3930e470ae4a528a47aa2c78e82e914ecffe87f2d03177ccd38a28d489a834cd5dcc73d026ad50d2fdb5b265ac365ab91ae4a5d579f7f8d59eae4474e497856b75b306e541e64dd6b2091e704580f36432feebd9c74493775cefd1d8c939894462d776a5ecbc179988172096697bbba793134af7796d3565166b6f74ba2f57134799426133d0144abeb8c8881d645cf77b253be0a2c3681a99bbac28196b575c1117fdf8a5c806ab65e9667a9d1d00cb047252d71df7060a492c4b39272ff2b593f8e4a1eb0892aecedb41b7882ebc5b5137b676d566e0960b537c7b37743a7cab436aba75dff1cc5def0959c31db91c0209b3175c872e8015f0fd21fb98d772e3032659fee07c0f324b6788ab82e759a9c6b484fdf229ac2a04558987873dc74287ab3a664c211ec594aac926062e3d38d8ea2ad4a127cd17a58ee46ddf965cf7ec33d71f132c5f4b4bb4b3babe2e847db7c03c248bd3d3625aa53367ca567694034b1eb93af27b7abf685408ab2cf6d37704a805b3e82be6118de8439c6d6a7f2676564a361bef0d52c99a5204b13433b989491b76240288080236e9c1905495f7acb35a0101f85c7b60c927c2a1b308210e5a3806612dab7517d6f6e0b7597caea6a5b17ae55e7e2bfc8b4d9632bda9097a730a49c16a2be442e6ce3f4a0f13b32d7980e6ef3349a3d0380d69d4f8b3981ff10bf27edcf29da6bd9048f03061b115195f9493a57afd178f196c4771e10a160c335e3fbd83514e593acb8f09875fd3a87951dc085559242e54f2fcde4129b5e2d23b1cd4410561b8260cbfe0181f560fcfc8b767c1b9003657d20182003d0aef98407ad9d5bb0b9ac2638a57b552287e7687162b8d8ec38d52090916651c062b5030f7c6059393f1fc4d688ac347472b556696e5d1a8873a2e9e45785f24fbe04e330bba9d51d7ae21e76026f74a9edb2f595cd61ba67847b7dd25d34381d17407fd786ee82e543a02a107049a8ec6eb064f9fe934dc1b7142b2885a6cc7961012f6effbb9ed90a6aa94b98a46eb7aae431e947022e46c604b1b26b5244f93c04cf90178fef5cbf9a364c5e610b190b5c902ade4b6691843daa10404b2c4882300559eecd1b6264ebf1c21eb7ad5abf104d60cfe98d518c687e716d0313dd6b91f69e7e76bc1d45b928f7f9821bbd42bb2c3f76ab35a5f34d5df18b1e9db26b286fe48dd58bedb0bdf3f54e4953696f9d0144fad253d33a72da9bd241e79d716609033402fd3084b149fc04bae10466c67714fcd6aa06cc9f81a8aa153ad622bcc7d23ae8b608ce509c4fb3d6482fc0b037a8257064205826c407bdddec776c367033cbf30b0e9e0021e53c9d68e909aaefa68f32e50826ce52fa7ea8b9f36ccaefe6b860ac2c46f0da02cf770d31de0562ee5fd4e8377f2bb6bd8ed33d034862477212c88252b5631db7fccbcd102fdd15ef15de46fbee3bc4517ce071f0bc8bc2a304969ce301f2491fa80a3597a49ade5b41d08de3163d4e1c9cae4e548a64ad64028e2dbbbd6f5d1e63a936eb7679ffead318b3c09e1c56788333041ace02e3190fa086a07ff7dd60f8a72fee486472aa3c3ca704df46826a135feab32da580fd1d30e63966e62aca34483f22250783ca8889954015d4e116e017553f31897845590c2cc6882c6b7fa92b0b9bd31e483d4e5678b96d4c70b46fb7a6f72945b7e44680201ecc7f5e6a8213ff735ed5a7d2eba3df44e4be90b34c8d5dcb9e0cba6c07e96b2427eaa4daa6b31d2ba8c3335d43d2e91fce30d43287c1c7cc36c1351e9734f1631a9da1b92d027d2ab53df715d3cc2f06ce33367beb34e9e450aeb59bdd98c38a9c194c359a25cde0a12085c136525853f82c1acec574849698d408de17dfaa984ec088e6c00b66f939bc4df56631d5f4c06f22c871a8a373f045091679c274735ad468b5d98f4d10775e2cc26476320bde2a081eab25efb21f4dbe6078579f0befd008a021c1baa9c47a0550e6aa8172a2e45898ce4825aab31ba6014045a7daf93eccda99fbd498fb5ec9eff18eb12013e61ef69e46de76c44303d513da4428776041bffdc32016942a89b2b79a535a90a71b31ac6ab071d968d8dbd5e9d364f52dbb956d2d92c4911621b643b1f038c4a9924ff0e18940e870956e45f9dbb86f6a7f8809d0f1887c6d6a5b8efb554a89dfa45f961a79ea612671c208dfdbce06f0187218531df28f405545cec3a0ea58ee13cadd53183aaa90073d22e27e9e44d22eea46d3a6629cfac267b2ff1729c3057e17b9fe0eae5b802f5fbde8838a58de261e943fb8d35105341ff5c0be63ae1f26e4964b80099c39023159015933fd2749b129e1bc944cfea9ff31053bb6493deda54f7015440d71df08de14653fe2ff03bc4104339b24b306791af40645f650b64f0e9d16a29bde78d890782f3118f147169dcd3526db36ee3f12badf246ff9cb551fe7764dbb1528a6e29dd4b941ba724f79eb8cd6795d3361656a29e938d6449bacc36dc44e0a5b7ac26f7778642f293c7afb7c5d5f30aee4c5beb34805e01eef3fafc71bcd3452b1dbae1922c9e8492772968dd8bf08f95d66e823bf8c96a364ff761fbcfe49ac5c2e3ae7c8d4fdc9b97dfa7fc1fddeee4a0f0c024ccf1905b6ac0da0dd24d119599ca46331c764beab193628c4ec5395032bedef52bd8e5911527d23088106a112b7b94a5a7cfb55c00a632c212a21fb3883b155516018f50f26ad77546955dcc0dfdb9d8977d224adb0b5694e015a664639b30925ae04c77565e47824e12dca7f3b8e6760195f0690df5bad8d01c7a1dd4fc2830d5b200ff33c8d7f557499966697b2c6cef47899ed16d9913ac7c1650e506410769e9a5240979f9640f2205f73a70c45232805b1dd97815c682217f94c0974908b5f8325c783597240a16206c1be09e72aa9469f1cb25fc55b4557e6094c2e09aac9e419f5912308674198e4ce463a4c19ec472c1192923bb0d22000ef0e1e72ab72674cb99b073a6731924c3344ebc471b64ea20e869e961c4a8f2da755f1eeec106cc455c5932089ea5d169ee206bbf542d6007265706fb348d74b70d658a3a34990c63214229dd7b2315e1d1b025099248e033ce3cc10134f2bbd8fc0f605618ff5e9ddabbe63c5cf30ba242fbd3e6104d5235cb41eb7c92a164dbf40faf216803f449cdc5f6549c703f8fadea8f58134a4d138d4f822cc541d99c76bd268100ce11de85d2b1e9faca7c94322b6a3f376a2579445cb3bbaf3f8997967ad523c74de55c07bad24f7479bf08ac438a5a87da79ac395b9804d778fa2197c9d2e5623749cbe0429ac81706dfdc9a720e84b653b3493e11ef982c574f94a39702385f030e3d8d5ff5689bb2d9ac35f8597d7db9ba4c7b518659a97e07711f1f834ca51d53ee1be4db963519d4008566e13b8d45a9436eb536ce092e3bb7c8606c6478ce63b00e8842c6efdf5337aaabd2078a01249432d93e49ab5a07c6e2a1d4e1fb32a45af4a83a935e5688559342328cdc54da10314d48250186533e6111e0ffbef5de775d9d82639d0cb2904798b546f11d5004e0008818f6ac33c7cab33fa55992ab4f7e64c4c8b2131de78a3095ce0e2308fcd9ec77a1ffa13ee02f72bdc52f73e17bc79beef1ce8be78d508cf0d6b9b7a6f341b283b25bfe8783f4c484600c88c9ad651150ef5e70df53acb426c23cfbd61b39895637442d57c4e2eb89786e5b87ccb32775eeba225e8a0577e944b8aa20e7a59316878a0b57aa337ef11f75a01632721275806fc9ea1351bd823dd11f1f1f14184a9ffba37a68d365f19dd9cee4f2659f4bbad7877b201b6d220b28fb8f7cd922435fe8efde541991c6992dfedcce44b68fb162d01d4c159ee8f056e5538cb4de0a0f4c41210da4a220f383989a26796355e6dae2e0316eccc1352d2efcf4ce6498c6f101c3cff5d1c2e9dffd70815719edf33c1c9e1587efccd1fe49c6797c4f6609cb6dec19e6fa96aebd5cc0e3b8c028c4950b4371dbf358ce0271b9accda30871932357eb8d0fae58eabdf174b9381720329b8e256e842c97ba59ac56fce73e2631280d5610d34537905eda6bfdeb635101c0c199f04d1ab0d283d4cc2976d3152e33c9f504da9bb082adf6289287e29af14913f3fdcdd988e9ef5c4f9e0a174d0959fb71ed3492f4752adb0f61aee05196db8014ead1eaa7e19d18131445376802272c2eb72da5810e37291cdcde8adf12c29c145c731f4452e84b481fdb00293f6a413c6b98db9e1dbac37f6190744f191051b66495edbe493cdc08eba0215f15169ab891cb314a0380defb8d112b789654496e6bd7d95cfb0481b36a9553994d43d380b75cd1b8049294cb11b6d2b45043b38f5c19776303976cf23100f52a5ae839a483ccf317c3d0f9173a5016a58e55b3af7432469f763ac2d18531510ddc666348e8ae39762a65992abbb1bfe0394f0f9796a691536aa94bb448659d52f230a0e11cbe124a34b40f9c581868919105c12a71f5b1556839a147eb263a3e9988cd08b8722dd611b38cb160eef965bde8ada8361406cff04b360488b7e6348efe9072f0645a59037969db3a8a33e18a50b12196a0626e2b2f2edebff35614ea6a7cdf835d9284f4692abd5a956b6ff3198da2f9fdc6bcad2cd9e787ac206ff29379251c6623b77d2e3f3198376b08e69046b615c3c66a45830da82dc071146874b863003261075bd7d2d669fa46b6696a9fe92fa05d389d581f59992bb61f05814158318d1d0afbadcde66586f"}, &(0x7f0000000140)=0x1008) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000280)="66642f343735006bc81a30f48a62d8694a59365f5ab67305d1fe80ed3c6153655e67e6fd4905f2e88242936ec146692c8584194c14de24e890deb876533c037ae9c8b4148a922f318f8ea48bbd0f94f3f22da9be7634ad05d5831dcc39666983d4b304d212fe28482bbee9e2610dd53e16d6c200d56c813f9f4a3391d8d5702575f43d30b6609cc3e2065200c40c97009e5876b8258b45ee5db7") openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) 03:09:31 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xe}, 0x1c) 03:09:31 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x400) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000080)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="68667306", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r1 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="c268ce6cc19eb63349d1a7a7beb38b57027cff0df156a11bb7b5e2558f6822d555ea02b9d0474613a325e45a28ce4658c14cbee50cd4f608a0bc4e8e14e2a205e9c0369ae5a8ff2467cda17ae2b8cd509e83fbe0a79a89f052a9dcb3ebe7b8b4b971ecaa723ffec18e7f5409890b01b252ce", 0x72, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x10) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 259.183095] proc: unrecognized mount option "" or missing value 03:09:31 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8916, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:31 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000380200", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:31 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x14) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000140)=""/42, &(0x7f00000001c0)=0x2a) umount2(&(0x7f0000000440)='./file0\x00', 0x4) recvmsg(r0, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/35, 0x23}], 0x1, &(0x7f0000000300)=""/121, 0x79, 0x1ff}, 0x10040) 03:09:31 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x900000000000000}, 0x1c) 03:09:31 executing program 1: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0xf4, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000fd8000), &(0x7f0000e7fffc), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x10}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = getegid() r2 = geteuid() mount$9p_xen(&(0x7f0000000080)='vmnet0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d78656e2c63616368653d6c6f6f73652c756e616d653d8c626465762c616669643d3078303030303030303030303030303030382c64656275673d3078303030303030303030303030400030312c64666c746769643d", @ANYRESHEX=r1, @ANYBLOB=',cache=none,dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) tkill(r0, 0x1000000000016) r3 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x80000) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000340)={0x4, &(0x7f0000000300)=[{0x6, 0x6, 0x4, 0xfffffffffffffffe}, {0x10001, 0xc, 0x5, 0x5}, {0x2, 0x100000000, 0x1, 0x1}, {0x9, 0x56, 0x7, 0x3}]}) munlockall() prctl$seccomp(0x16, 0x1, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) [ 259.319258] proc: unrecognized mount option "hl3IѧW| VUh"UGF%Z(FXL N6$g͡zP৚Rܳ縴qr?T R" or missing value 03:09:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:31 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000000000000000100", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:31 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000000, 0x8000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x1, 0x8000}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x100000001, 0x6}, 0x8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @broadcast}, 0x10) umount2(&(0x7f0000000180)='./file0\x00', 0x4) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000002c0)="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") mount(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='configfs\x00', 0x2, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000200)) 03:09:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") tee(r0, r0, 0x20, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xcb8f, 0x88840) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000140)=0x44) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x18001, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 259.370872] proc: unrecognized mount option "*" or missing value 03:09:31 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x3000000}, 0x1c) 03:09:31 executing program 1: mkdir(&(0x7f0000001840)='./file0\x00', 0x144) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x1008, &(0x7f00000002c0)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000180)="791181b5a74462d48175a32a84c054d4333de752db79346f4ff1b90fead8902ed21b9efb57f58a4d086c7d65bad0819f705a5f5b5620e07371b552d9d63f996ae3cbd1b9626b0e2e549704357bfa595bb9a226c69db147250fabf2a49e5d6e9ff9", 0x61}, {&(0x7f0000000200)="854ed60ff07b08973dc393470d575e53f76df5c833769113ea23b758f530fc5d31e475f1f756273dc06d837d98b5ab17c7f7176ac75e92ef218ce7f0b844d4a8ad292bed5fdf023d234d83d9603cc0746f29a1d0da", 0x55}, {&(0x7f00000002c0)="d8a8c57a0282242238dacfd5bec7e1f125e2879edb63275bef58b841bbb7e67716200dbb2ca89e41dff133464e7bb01126e2ff63f6d3aa889f86a8069e665f75c0a09cfad4b334995977dafbf21acb10075279", 0x53}, {&(0x7f0000000340)="c97d91d1c57f1a7978cfe339045c9c1268f29f9faf919a9bbf1fd01c6d27b5d3bc562f187c6dcd925ce02a7090c9e765559c277474929c6ca024ea200c2bb882afc69f2d4b683eaaeaae3ba3b1df76511e45ef8bb381b3bd5a001770c4153e2d04671771d4aa6da3a530da4ba69be8386c8a1f3af0af66a6fb793704a3ea3b30000acda8e91f936fa8db460adf50abc55c5c3033123b92519882af1d8e77f039ffda2be6a89744e095bc723f49da760b273e1e9e88c5882972a5c4db3e3cc6251162f75dd1a6534692ea1aa1dc8ad3870cc532e1eb32fad90f80e4a06e308024404f5212f3b7fe6d8fc4b08ab449ffd3", 0xf0}, {&(0x7f0000000440)="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", 0x1000}], 0x5, &(0x7f00000014c0)=[{0x80, 0x29, 0x5, "9ec9a4b9161916c6875eea7b167d5bf41ea1137833d109e9b2fdc845b094fc5cd310b640e21d7e1eca54d1e1ed2aaa8ea01167d5827d0844fa34ff4b962fd72e247f9fdd8e0d9c82f763553e151415ea8f520dbe13b79c81ef9883d75de069215db5b026cc30ba5b4c"}, {0xd0, 0x117, 0x0, "e9ddb013af12b4b59ae533b1dd22ad798cab015a98bf5715df1cb0038f1b41f97e7d5be91bbfa3a7c8364ce7ec61b7b8277e7fa520c9f8bf7f63009ddfe405021af57e3fc4ade3b063e2fda1a27ffd68ebd54cdf0421302caca6dec1d2f69dc13e5701e8364c2274171597b8f3d07980ba17627902c730a2321721b35e9061240c6a100ab7d7c182f4de6e67debaf489c2a224da68631ab97ad2327bf2a27a81c969e868aeda0b1def32da47e6a1ad3edf0a23fb3c227de03f987ae07f919aab"}, {0xe8, 0x10c, 0x8, "8f945c22aff2695069ab4e9c89d9d2649afcac9caa4a9eefb1980cc20be8afd8cfbaa7e3b465b55f1dab3a2d7cb0bb6a3a47d0fbfafb92a8df1a37284e3f8de4a89ca297cc7319ffb60ed16e724fdb8eb47224d5e6ac2dc01fea0a00925b62f2c7e8c5b1091583b7cc2d2134ff71eb36ed8039f721d8949ffa51cc34dc3c901eaf0e8431ce7bd71b0a48f3cdcaefd29ac9bf66ba8bb665ea444ff6404a79f96d2cc5df5fac1e81a4f1f5a0498e5501baf55976665ce467ed6d1c1239642cbf679c0f2382cbbcf384bd4771901f924769367f4c3e"}, {0xc8, 0x10f, 0x0, "6fd7d29ae1071365eb42c06d424fb3f34791543c81b8a99b0f246033ee897c324a2b9f215a15de0d7506f08d756357fa95980e8edc37904b198f286b6de4369719a5049a76406460b805771f6aad87fe2d34c4d848f62d998668075e37f5c1604f67961be1b13adeaf27fde48bf92f2cb88e373cb4ffa1f59607fb09066dbde60a66e397a474c33a3b5da2e16e56d1717707b17717bfc7283b534e1cb9b7d7cecca00fddefa847a4c559569de8cf3f1b91e16b4ce0268f"}], 0x300, 0x4000}, 0x24000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) setresuid(0x0, r1, 0x0) rename(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001880)='./file0/file0\x00') [ 259.497853] proc: unrecognized mount option "" or missing value [ 259.517478] proc: unrecognized mount option "filter" or missing value [ 259.526036] hfs: uid requires an argument [ 259.530265] hfs: unable to parse mount options 03:09:31 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8981, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:31 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000340)={0x5f, 0x7d, 0x2, {{0x0, 0x42, 0x1f, 0x57f6, {0x0, 0x4, 0x4}, 0x10000000, 0xa7a3, 0x8, 0x5, 0x5, 'proc\x00', 0x5, 'proc\x00', 0x0, "", 0x5, 'proc\x00'}, 0x8, '^{vmnet1', r1, r2, r3}}, 0x5f) 03:09:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x6e, 0x800) r2 = getpid() r3 = geteuid() getresgid(&(0x7f0000001a00)=0x0, &(0x7f0000001a40), &(0x7f0000001a80)) sendmmsg$unix(r1, &(0x7f00000021c0)=[{&(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001940)=[{&(0x7f0000000340)="081815a94272b1eaa26b", 0xa}, {&(0x7f0000000380)="c71d0fdfb23480a6d74ba54bbe0cc4cd61bcf01b4b500098058f61d2dce15799b852a97fa3659d78d4ff5b4f59b2d660618618898658060cfc4d6d64b239bd10022d33d5096d9c65b344dd8e8b63b588f4e79ad52d5650cdea6406a7eff999d4f1b28a631a54ec25559e0fc749d9bbaaf3067f66ec7bbbd87c92ebd6942d790d117d01af716eccb42e82ff0f219a7b0e7904d7796c17efe5ce2871d8cc4f37cac8cb5dbf598c85160218ebe607bcdbac129ddd12445be46298003b04d5fcddccd79ee53c41c5278946b2d1a448a780cda169f9e6d90e958b7db97bd485f2d0a7d6d62b89c541c11d6b88467194ee0f", 0xef}, {&(0x7f0000000480)="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", 0xfc}, {&(0x7f0000000580)="ac1b8e01b1c936b2a272b4dc5ba901e706ebfcf5c3b31c4e41ebe4338793482c2dda2a89b2949b02aa641872ee0a67e347c0620836c69160200167ba45a986287619b52e4b658056d834c63ad6d8a0a3b2a3040a40fa42e1a6198c9cd1e5518a9d1f9be0b08b35440e3b26b45b9af6583524", 0x72}, {&(0x7f0000000600)="8827093b9cea87fe10dba9fbe0292ef2887a3ee9303519bff9b946cfc48ea455b018cfd980adcd63ddce72a043e27fcb1bec4f9a7cf20617df0b3ca4540e0e89015104a472ae14b9ee0a60327fb5512be519b2f2b70d5e62c3ddb19f0178d481ef3bb7809476f397e51dd5d38ad74dcdceb42ee0fe859f31aae5924b373f4366f53ab3cbc1124e9a", 0x88}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="43b135959ef14df411e256de20ad4c4d3bb3072fbce2e8dcb35f0635039a0915e871359d81724a7699a0deccd91a702309a12a6850a4325beefd191aa4eb28da49b4923b92f21f8ad58e6d3f4e29db912f218d825b32a545517451c170864024de544c00c9220d283366ba11f9eec994793fd41c615b2bad08ee0b60faca6a250a4defa22f6be81957e5a284d53a325fee1719f4ad51af85fe721670ee144ad4461cbdb9651a191b5013287d7e4812371948dbf456fbcffc63d3c7e38fb62640b531543292cf95f1b10d7a70a0cafb2e5b2d6e94e6ae6e927214f4c28626b248a5782687a1c305df9a", 0xe9}, {&(0x7f00000017c0)="2f14fbae593c81adc642a3732ebec9f96512952cfd83bd894164712505a1c9accc304336e596b1f725c9072b86e938", 0x2f}, {&(0x7f0000001800)="5d2d3c729d7815ad7e949cc6ea501c8ff4d88faeffbdeaf530bf330993ab58919c19555b271063c7f78760c24fbb58e2487095e5ce623439", 0x38}, {&(0x7f0000001840)="7843d5698a54eab0801113f3cc52a9f6009b629529a95462cbeeb199e73872e80f8e3c02798f772fb86cffc68067034ed796b787a3eb1f1495d96c3c38751972bfbd23cb4ffbb3811d210f1d4f4fe40a9863aa27a588867aee6afe200be81315128fc1c215a612d0aacbc40ca5f2a728c1fbea7c012af2a42bc5bbbd61ea4a690f791f7cb85707fb711f63ff8ec013ccfeca648d95d0a267ca1023c23d31a03ea4f643e2cd261cff25664e7407a0f2a7409eb54f56cc93dc5626cdbe30a30c7013cab18fc94196da66dc18727b29a6b812f7d174d6", 0xd5}], 0xa, &(0x7f0000001ac0)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x40, 0x40000}, {&(0x7f0000001b00)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002040)=[{&(0x7f0000001b80)="8484d051d46f59d99603f8d32a79ca89252b47ab0237fdbbc51b23893492d3b4fa68ca2c435d78b460e73669abbc5ea82e1bce52aae752c20e2a2ed00c36aac694d1a148d648eedf8eff78ca6838fc944c910b9e248e134d429da0ab818950ead8fbe9160fc79fccbf4b21d40a213e45f67cd30e95dc65230b9829074dd2d6c9e9f5dcfcf55cc93613ab", 0x8a}, {&(0x7f0000001c40)="563382675fc2018e91395b5f367cf43c12c352fc3d7afd83e4ec3b102de07ca24bb959f40a6b604b6e2f373fae2a695d9cc2a3a4717d32e683b91d0b5722f0c272a162c4d72c006a0b9108c10a870762d7154a840bc6375c5f8fb1266f5a46d6a1cdca57675f61bd4675d19014d8d08b085f8a7614ef9732b7d1615fbc29a75d7379424f54315101950a55ef8b8d28c1da", 0x91}, {&(0x7f0000001d00)="b3c2cf64a5d83fa99a34dbc8a11dd159bd0417f8bf05d30c77724bdc6728dec6f15486ac6b6c004379d371f226586cf8f981ecb3eab86c2dbc41c339a3a0e07cd1fdd7e6f54ea4a027400ff04aa28125b38001a53d79dbb55165a68493bc1aaf7b48700c4b3d4d4964ea8c002c5625698e508de0fb108a3636724b207a0315f1a633aebeb410af5b6b7d86ccd847aa27fc24e20384fed2573a3138c98fb75e491bb71f12721c18fafb4b541c10865dbd8d2073a7248aaf7fd8c9b80c3b2c821b8241908308657cb16cc199471a2fd6e0af11a196d9c4299fd4e8ac8ce61445c40e3a35857ebc6bdb20041b79c23248fd40c56bbc2b0e0df72f1dedccb4cd86", 0xff}, {&(0x7f0000001e00)="df1e72e7dcfbe76e6207b6cf7aec4dd1289808400e5936dd5a69b88f8cda6488efad61be3659663781bbafc7c3e029bb2373a952ce4800e3dfcb73456206f77c7d523e88591146c4bf3a96641c6a6aa1fd4582e82d4b606642649925dc75361f1b4b2ee89bf18f16389c0f2f501bc2de9617c3b6329010578f185c0c6200ebfe5ff2d6b744fe69c535ea1688b3ffaa3d373e4ce24323fc9e081d324d619895fff80df9134b9e9f1685530dd4b0f6a43f988b2da84f823c0694745c6ae35d27a783fc709d8154e59284294a636eaeea7a44431f1442c1dce7e9b5d559de81d21d2a0f247ac6003acdb5654ed8a06d3ace799a80f4", 0xf4}, {&(0x7f0000001f00)="ab8a4a6e791585d6ec6fbdf8513fe42b184f510eaf3f552f4b1b20e0887d79e5bdf2f5696a8ee4c47159975ff568cfc080a538a03f595d5732cbe7516aa83308e97b0f5146b8264d563dabbba660242fa8bc0c8728e6bea5554baecf54d393af01d251e8fc71ba1c1e2d7161eb5a28d6e695410a05b7f635323a36140a33bca76901611403370d160d1665438230b67609e3c9813eb4785afa6cea13dc8e2372bbab886f8eb6692fd1a8141d349a87e34a3dadf968d4cf874b15009d4b72ee01ef04bd09e6caee6071ecafa4d66bf698e6269294a1b38f4deb783563f88027b88a58dda4a34d7860551d2902f82fc39d2c596db5", 0xf4}, {&(0x7f0000002000)="04057ef6002d94234d1d3a6c067ef50636e989f1ee8c0d9d0da7eff6df", 0x1d}], 0x6, 0x0, 0x0, 0x8080}, {&(0x7f00000020c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002180)=[{&(0x7f0000002140)="5e4adbc271b18dab", 0x8}], 0x1, 0x0, 0x0, 0x8000}], 0x3, 0x40000) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200840, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x0) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000000080)) [ 259.549551] proc: unrecognized mount option "filter" or missing value 03:09:31 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00@\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:31 executing program 1: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x4, &(0x7f00000000c0)={0x5}, 0x8) socketpair$inet6(0xa, 0x2, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) r2 = getpgrp(0x0) fcntl$lock(r0, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r2}) 03:09:31 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x900}, 0x1c) 03:09:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:31 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 259.695979] proc: unrecognized mount option "" or missing value [ 259.705677] hfs: uid requires an argument [ 259.709968] hfs: unable to parse mount options 03:09:31 executing program 6: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x40400) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @rand_addr=0xfffffffffffff997}, @in6={0xa, 0x4e21, 0x3ff, @local, 0x5}, @in6={0xa, 0x4e20, 0x3, @loopback, 0x8}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}], 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000000040)='./file0\x00', 0xffffdffdfffffffe) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'veth0_to_bond\x00', 0xb5e}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:31 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0xc020660b, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:31 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x5, &(0x7f0000000500)=[{&(0x7f00000002c0)="c05abb283353e11897b35265838ecc92b230c6832d2b9cd19642893614d7088a7530823f992d91e9200fc4034fbec7a00202dc137af82a9a17343d0e5ee6c9aa133a37d09d02adf93cfb246003d9de723714c1a70fc96b1c42a304814eb1615750dfca6061a389c4f35d001b8e6dd612dd01e725dd97d61dfd0d225ee89d5c3d3a414c57647bbc5e3662332c2bfde33b4a3cec2c021bb74c3c809056a490d106acc0d4ab07ac3a6baa93be79d276e1c2e8c8b497e9c40d28e82e58ab1229a744c4dffc46ed76512896736f50755cf54b1abb03ee81f154ecf94499295330483a359d37032eea1970f06ed6df648de3ea4340ca08", 0xf4, 0x2}, {&(0x7f0000000100)="2c59f4807b3adb8f29929460d9985918dcc9ddb582f36ffee809c07caced4dca23cf822d713c6b45f2fe67056c7d9f03f6ee6dd8607206a51b29563228dbe315bb7206bb6079fc6427d802a733a58bde9ba95d6597aa079750067037a09e57bd6a778e1fceaa36f8978919c3dc44818b3eb731738e6e34", 0x77, 0x1af}, {&(0x7f00000001c0)="f113bfde0f5f75dc1db492cf45ebc142fdc06c7eafbada364c53f8f238f97a9869865d8f63514f8a2c71b3d7b79bb242a9dca2ddff1348b6c261156f02aac9aaf82f65cf15a3fbfe2dbd63e0ecebe1b22cd546c34e730e4af43c7c30c528cebce50b06556537c738c29c2d22506b91e28375f0e773d8c85d33e5095473737f3ab3f06bca3506426101ef5c42ca6fd4eda9f4f13aa5a888781fd766543ac144066ab32c7031e5e0", 0xa7, 0x28}, {&(0x7f00000003c0)="73b0f1adeb20dac50c9ce62b3497c3d8049bda1c655a7dd6bc04319254b1a85d09b7a376f32421ae2ac146920d20f07f7202b2b6bd5a5804c2bf845951503751aa23ed065bb180dbfc7bc5b5b69573870ac1538f3afe039eb7d173cb4a966529ddaa41d1867f126252ef97adbc695c1ffe505ba63529c3f51107e956a6eb75f49ef96c603c019b6511323c3a1ef3fa3fb7c4f78e04344ff3121624059f34f507cac5869d3be2f2a4e2230a5539fdeaf803101472a30189b55aa159b8388efc8a02e91108ea91b074b365c4b8e5", 0xcd, 0x7}, {&(0x7f00000004c0)="05c1ed1f989c083b9244bf1e063db485664c8d1dcff7f9eab3696bb39e2c98bb1e997f6a8784bf0c", 0x28, 0x1f}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="6173682f2cefad05a9bae028a5f426797a696e672c737569070000f10000"]) r0 = syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x40000) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000600)=0x6) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 259.756114] hfs: uid requires an argument [ 259.760342] hfs: unable to parse mount options 03:09:31 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x2000000000000000}, 0x1c) 03:09:31 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000400", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 259.860106] gfs2: invalid mount option: ash/ [ 259.864720] gfs2: can't parse mount arguments [ 259.882245] hfs: uid requires an argument [ 259.883651] proc: unrecognized mount option "_uEBl~6LS8zi]cQO" or missing value [ 259.886495] hfs: unable to parse mount options 03:09:31 executing program 6: r0 = socket$inet6(0xa, 0x806, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) msgget$private(0x0, 0x8c) [ 259.915881] proc: unrecognized mount option "_uEBl~6LS8zi]cQO" or missing value [ 259.927121] gfs2: invalid mount option: ash/ [ 259.931585] gfs2: can't parse mount arguments 03:09:31 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x4020940d, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:31 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e1b0000005e00ffffba16a08d59fe26332c0f972d8b40ec104aaa1c", 0x3f}], 0x1}, 0x0) 03:09:31 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000080)='\x00', &(0x7f0000000100)='proc\x00', &(0x7f0000000140)='-\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='proc\x00', &(0x7f0000000240)='\x00', &(0x7f00000002c0)=',^^wlan1usere-cgroupem1\x00', &(0x7f0000000300)='proc\x00'], &(0x7f00000003c0)=[&(0x7f0000000380)='proc\x00']) [ 259.967646] hfs: uid requires an argument [ 259.971870] hfs: unable to parse mount options 03:09:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfsL', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:31 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x100000000000000}, 0x1c) 03:09:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7, &(0x7f0000000100)="025cc80700145f8f76c070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:31 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000600", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x9}) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)={0xffffffff}) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000080)=""/4) 03:09:31 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8955, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:31 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x109c1, 0x0) faccessat(r0, &(0x7f0000000080)='.\x00', 0x8c9cf36594ca7141, 0x1800) 03:09:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000100)}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 03:09:32 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x400000000000000}, 0x1c) 03:09:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000002c0)="d1625d9beae70953029e30d5f6880b52c1b98aacebf6d0cbb82aafd6123b336196631b37e29e931fa8ffb9cc3d4acea09c28c1daf0df0681617c1bbf99725b119e9950ed934b14faa8cbe0866bb0d459189125b91db915f29e30158c6c13cd44979c3bd06084a6bbe172ba3504ece13e54f7e9c426a67351400649769eee3c03ca03146e747eeb306eb98021736670d622854710bb854713fc2fe6a03b8763e2918dc73f014230d9f12e38cc7d8b97a6fe157a7c3fdd7b6a62428ecd7f793ca404454ef3c7a54a85a311") umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:32 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000300", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:32 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x5421, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:32 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6ce9, 0x6, &(0x7f0000000540)=[{&(0x7f00000001c0)="d5fba3f1afdc8deb95cfeeb3abe2192044b824c2e59e4fca9d0592ffbe90213de50ee5c0ca7e54e6ca99b678cfaf22a9e12dea80730f6850991d9158668007a516ed0c11b26627913b525c2963b3261862e40c3912581594876d83c2adeb737d569d84833188c6a42053afa637d0bdff60d1e1683d6e5e6c1c96e3f31ac971c8712d96ed554c1ce33dafc2340fc25001948bea7f46d1fe306a201121b4407c1b66aee12a4739af0ce5bffeaabe5a447343f644bd", 0xb4, 0x7}, {&(0x7f00000002c0)="52edc6ea053f376526a78f60e984a108a0f16cdd60388f69c0d8938d8cdf3a55c948ed7f04bddf8af6538e860a54376e946c40070a96c98a4d4f75de748281f5c1e857d57974cb0f6a4d762bc848c625ce37e92738902363e7c52ad7e24fd9b4678bbce7745ee063bf62766b059c58bbd58af9a9438ba899ac1259869ced6535203b37dbfcda26b2619fd8531f8b0ce4be75d4f90596b7261973aeb6871eb791cb583a2e846cbdea17ba1d12c014e4252a2587a806128e2abd0ee6ddacb7d3200387638d7729a5d9da3da41dd6971de6ecd0bf99ca76070f2f0b66fb67947b5b76902ff38c", 0xe5, 0x9}, {&(0x7f0000000100)="75feeede6fcacb02dde57141e029c67af836e10c613587d5b09924d5393100652b13a991ec3f98053e0cfb847a9784bd17ec186bd99c9d8cb8dc789b04ee3e4789f8a952a33796f9bd504d762c27ef3114ebb6f08f3d5703f7e1a5bb88b64413f27196df5cb5c396f0216aa6d4a55ed6becb3583a7606f5c", 0x78, 0xfffffffffffffffb}, {&(0x7f00000003c0)="c306dce7250f8bc389da91084c692cbecf90c0808ce1d8d13f5575e4e0f4fe7714380509faf3ea9cfc731810ba723f7b5f378994e58f6921f57faddb915a18c94f3ba11ceda545773b544ec924e2adfc596ddc5e1a7625e9b5a9e5eb2074eb878c3ac477518998d23786375856905a4e4c0d6e6fb5af3e5350c63fe1", 0x7c, 0x90000000000000}, {&(0x7f0000000440)="e7d785d944560bef56420215c08d0a855b613278b7755a3c0ec5635b4f409d5735bb076d5892b0f9f6b6a16f6fc4982f3f75df5a6176067e291a67edd1d9fb2ac72e0dab5fdcba71038583351045ba62ca64c5ecd675d9b7fc58576f29e020d175ee39fbb1486a259b004633967ea42d7b324a7cae9b3058cfcc7b34bebf426d3d2499cd4cbc3b5211d21cc60950e6173cee5778428d98709343bdbb44d9e4f7ef21", 0xa2, 0x4}, {&(0x7f0000000500)="6e2e44745688bb87ffbcdb417276e8e42024c0b6a6287f50bab4c653492e0fd03e782042a0318b7ad15531015eafb22e2ce44424685e093419ef001e93f9", 0x3e, 0x100}], 0x800, &(0x7f0000000600)={[{@errors_withdraw='errors=withdraw'}, {@ignore_local_fs='ignore_local_fs'}]}) [ 260.251269] hfs: uid requires an argument [ 260.255488] hfs: unable to parse mount options [ 260.278141] hfs: uid requires an argument [ 260.282368] hfs: unable to parse mount options 03:09:32 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x100) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40002, 0x0) mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0xc028660f, &(0x7f0000000040)) [ 260.310340] proc: unrecognized mount option "b] S0 R˸*;3ac7➓=JΠ(a|r[PKkY%0lD;`r5>T&sQ@Iv<nt~0n!sfp"GG/;c⑍?B0.8}z|?{jbBy<ENǥJ" or missing value 03:09:32 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x60}, 0x1c) 03:09:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="68667303", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) [ 260.359533] gfs2: not a GFS2 filesystem [ 260.370943] proc: unrecognized mount option "܍ D$Oʝ!=~Tʙxϯ"-shPXf f';R\)c&b 9Xm­s}V1Ƥ S7н`h=n^lqq-UL=4PF0j !@|f*G9 ZDsCD" or missing value 03:09:32 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:32 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000007fffffe00", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 260.401438] proc: unrecognized mount option "b] S0 R˸*;3ac7➓=JΠ(a|r[PKkY%0lD;`r5>T&sQ@Iv<nt~0n!sfp"GG/;c⑍?B0.8}z|?{jbBy<ENǥJ" or missing value 03:09:32 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x8980, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:32 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x102, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r1, 0x100000001}}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:32 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xc8050000}, 0x1c) 03:09:32 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x41007701, 0x400000) 03:09:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) accept4(r0, &(0x7f0000000040)=@generic, &(0x7f0000000140)=0x80, 0x800) 03:09:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:32 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000000000000000008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:32 executing program 1: sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000080)=""/58) read(r0, &(0x7f0000000440)=""/100, 0x64) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000001c0)={&(0x7f0000909000/0x3000)=nil, &(0x7f000090b000/0x3000)=nil, 0x3000}) [ 260.593693] proc: unrecognized mount option "/dev/autofs" or missing value [ 260.630331] hfs: uid requires an argument [ 260.631919] proc: unrecognized mount option "/dev/autofs" or missing value 03:09:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200000) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000000340)={0x78, 0x0, 0x4, {0x9, 0x1ff, 0x0, {0x4, 0x4, 0xff, 0x5, 0x6, 0x3bfc, 0x1c4a, 0x200, 0x5, 0x40, 0x100000001, r2, r3, 0x3, 0x800}}}, 0x78) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:32 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xa000000}, 0x1c) [ 260.634571] hfs: unable to parse mount options 03:09:32 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="ac4b6d3f5ecd00ab5faa27351abb", 0xe}], 0x1, 0x8) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 03:09:32 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000000400", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:32 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x89a1, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) [ 260.743772] proc: unrecognized mount option "" or missing value [ 260.746066] proc: unrecognized mount option "./file0" or missing value 03:09:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:32 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)="70726f6f3026134279541672633534", 0x40, &(0x7f0000000340)='Qk') umount2(&(0x7f0000000180)='./file0\x00', 0x0) socketpair(0x8, 0xf, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000040)={0x6, 0x6}) 03:09:32 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x7000000}, 0x1c) 03:09:32 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='\x00', &(0x7f00000001c0)="db0f9dba32ee70726f6300", 0x100000000000004, &(0x7f0000000040)="fa") umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:32 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x5450, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:32 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c7465720000000000008800", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 260.892611] hfs: uid requires an argument [ 260.896996] hfs: unable to parse mount options 03:09:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)='hfs\x00', &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:32 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0xe00}, 0x1c) 03:09:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='*\x00'}, 0x10) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000600)={{0x9, 0x101}, {}, 0x80000001, 0x0, 0xffffffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) stat(&(0x7f0000000300)='\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x4a7b07a83cad1d8d, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@access_client='access=client'}, {@access_uid={'access', 0x3d, r3}}, {@noextend='noextend'}, {@access_user='access=user'}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@msize={'msize', 0x3d, 0x571e}}, {@cache_mmap='cache=mmap'}]}}) r5 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x10000) name_to_handle_at(r5, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x31, 0x3, "9e304d24bdd71d670f359a36d0acf9d892bf00ddc4f14676cb4c205c8330e57cb02fb911a3dcfb957d"}, &(0x7f00000001c0), 0x1400) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 261.063067] hfs: uid requires an argument [ 261.067677] hfs: unable to parse mount options [ 261.107024] hfs: uid requires an argument [ 261.111390] hfs: unable to parse mount options 03:09:33 executing program 1: setrlimit(0x0, &(0x7f00005dbff0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 03:09:33 executing program 4: r0 = socket$inet6(0xa, 0x2000008080f, 0x7f) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000002c0)='filter\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x4186af5d, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r1, 0x5467, &(0x7f0000000600)) ioctl$sock_inet_SIOCADDRT(r4, 0x894c, &(0x7f0000000840)={0x0, {0x2, 0x2, @loopback}, {0x2, 0x0, @local}, {}, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x468f}) r5 = dup2(r0, r0) flock(r0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x8000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r7) iopl(0x1) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, &(0x7f00000001c0)) sendto$inet(r6, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) bind$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0xfffffffffffffe26) setsockopt$sock_int(r6, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='$user{\x00', 0xfffffffffffffff8) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000006c0)={'nr0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="33000000010000005998a8b50300000000d5000022849119a9a37cc969fb32c250453f8733af96e5e400e12c2273328fd505d2b4ee0f0000000000009d87630e3cdc49a7d72bcfb0f37acdb7a8c5fa2ba7649e13321548a00a59d74aa2c19ccb01050d25ba3d336e9e9471afeeb11a89be1f6c338e9cd9214caab809ec7a7dc23c49fcfd7328d0d16cff76a2658943a7630e549bda26220c2c12b00cff6dd490d39c9ca1123df699262d47b397e12b506e67d0252744afa2fcaa45d01f0421900493c3c58609b17aee75758c683e2cffb7584e632db161638acf3f39390708ce45b2589d9bdf75afc81c6a0dbe3caf96640bce0295c6ae6b696dcc82dacda65cc720d035e9f9f64acab7170aef13edc20854e9e348ae181c1a294d9fcb272594b2d8227d590b6f6f90486226ef742f91581b9128b34b4bfe321c0af8139090623cbd1977e754e298b8ff7d18d85b961a885730057aef25389afae214f2eab288fe9400c52d0d3cf1ddbba524d0ecb4ee15a66853075208546cb09b317c3e434392f2ce156effc0c7aa6aa98d26dd695c57f3dd426a676ac1f78d519155d50602fe70a6c3a3a2010000007c5c001e70042dd27a6cb008d773b613ad3bdf71e84763941d9fca9bf81412e6d3030000003663245e8159362173aaf66c4c8092988cd372cdde3cee6a32b7278dc32abcf29d4c2ba15d75000001000000000046c1fdee1dcfff983542fa251beabb66ae3260575af3ba86d9feeb2cbf5130107931ef35e6d9e4e5fb41b760bed8ca50efba73d138abaed0af8156cac3f7d5a5f12ed9c077771262d565fdf10d644465ae5e6c858a1248822a863c97d944ec5fc49348b46cde6108a5eced7e83b7f59ac40078b29d69ccecb723410a78b6fb5b2e87faa9f0bb81156008fe02a79725eaf77525b6d87f29094df5eb53c728e91e70beae64358ea54d93ecb4ac46786c33059426ce5925c2230000c1f7941b1512f2ea20b77f54e40a999a9a433a45f6de23f8b296c2b0608368899c2dbc394463188731c4be6d248ed2760a03ba428b911aeb0d0646809bd1fffffffffffffffc73221a5836b48ed418f12b5cf8a068b53f6050fbb769351c9e85e8295fbcc30ea489455bf94235f6a6302b49f541ff3d3a502e7e5ab9319c633468eebadca31e05fba8b37e01f8d686b9938adc37ed0dbd357c7bcd1c88691e6f372afd1da9e25f884377d522c0f5dcf2bb18fa977ba1cd79b2a3d0559856d71b08af262b8d43776aaf766db85e0c210af7ede917d88620cc7363de5423019a252cb6a1c343f5da0937ae65754f553d5beefa55dd61f4e1b33f7603d5df9ef5da1019099e24effb49bbd955930b2ea1ee46f6a35e5a1bf7762200"]}) sendto$inet6(r0, &(0x7f00000004c0)="34c7b9acb018217defb29aa0c7e541a906d947f2eb98f01c6d17b70d5e521ec0503830fdf42c2088c090227575514cc93c88412303dc822a83406952b74645cca57d85c566256fce5972fca487ff19fcf0d1965d3325cc9f017df0ea6a877dfc2b789c2c65bb4b39841b1df992312474105a4ef82f5a86760936f648e4ac65b7c736c0bc111daa57501ea238b0b52e7860dc62faa8cbf8ab707c6ff3d5134f79dd0f145f1a99ddfe1cbd969d8a072fa96a0450b173e5f9dd3bb1b0cc405cdb768877aa81ed93d461634183c263b87b30", 0xd0, 0x0, &(0x7f0000000440)={0xa, 0x4e24, 0x0, @dev}, 0x1c) timerfd_gettime(r5, &(0x7f0000000680)) fgetxattr(r1, &(0x7f0000000400)=@known='com.apple.system.Security\x00', &(0x7f0000000740)=""/206, 0xce) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r6, r8, &(0x7f0000000080), 0x80000003) 03:09:33 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00\x00\x00\x00 \x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) 03:09:33 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) open$dir(&(0x7f0000000940)='./file0\x00', 0x600200, 0x40) chroot(&(0x7f0000000700)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$xfs(&(0x7f0000000740)='xfs\x00', &(0x7f0000000780)='./file0\x00', 0x1f, 0x1, &(0x7f0000000880)=[{&(0x7f00000007c0)="21be8b95c005b805a2fc1c080ee74e38818005976efd88f4b8c57ce4504975a077ddfe0e3123f556e7d7fb36b0a814d7853a77619cacdf76c3677ad49af5251a726e47dd8b2e156979429f0791709e248d39018120fb935b4a5b6f64be253961e30ea2b73112dea9cbe5d59d9c8460cef55c7ff8dea2761bf77ce87fdc05ac2cff4c1cacdc0a1e", 0x87, 0x3e2b}], 0x1011, &(0x7f00000008c0)={[{@allocsize={'allocsize', 0x3d, [0x37, 0x3f, 0x2d, 0x70, 0x0, 0x76]}}, {@pqnoenforce='pqnoenforce'}, {@allocsize={'allocsize', 0x3d, [0x7f, 0x7f]}}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@logbufs={'logbufs', 0x3d, 0xffffffffffffffff}}, {@noalign='noalign'}]}) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffd, 0x7, &(0x7f0000000600)=[{&(0x7f0000000200)="1d960ec244c7441ad04a338f6a2c007e0abe951a92fa31ef512047d60b39159aea7929", 0x23, 0x8}, {&(0x7f00000002c0)="866a558d04debd65d06f3c6205a9a85e52536184fc7348fa110b7af1322811e62e1f4053fab61065547f9766330d5121af3a965d76db554e0a170393aadba4323d1bad8ab5938efa040ce73d23f8f5e0fc816e1205b7f7e83918cfa05c4563f6003d7070f7da66abf9152cc6c138c0cf3b55231247d59fdc538522033f9a385cda3620a90b64c49d80615ac60e4ad867f52a5bceef0105c4c0282a997adf8ba70d5809d60af59bcd2e302e", 0xab, 0x3}, {&(0x7f0000000240)="fa4156b6df9b2891e870df915fe7f33137fe342f94559ee1d45c4874614b425515e6ec9920ceb6630b9a8a60474b42c7f79a2438", 0x34, 0x3f}, {&(0x7f0000000380)="ac643f9001dab7ea7cba32d011de49a1cb70687162e80897b3e6f01b7a871bc585becbefabd2b39639f8ad66", 0x2c, 0x103}, {&(0x7f00000003c0)="608aac261fbabfe1baae519033c91761c1acec750b848a67ccedc32915cfa87fd18f0aba10077ec91fcb5573b5112e5d432d2ca33e1581be2ca5c50d5fc1b446b96b0a762f2f2ca4149e5bb31933ea45cab6ccadf093f1990958b3cfc619f40a3e5b80be5add9b90240e5130d53e49d6e12fdda43759ce472a17ad29e2fe87c792ba901c33b13bced57606ba3e59a7b9b7b3fe400f5697", 0x97, 0x80000000}, {&(0x7f0000000480)="6c46ed2e642575ebb76d991468b5e8039588002e674fca22320aef2483fe067443e4177c6ea7fb2fb41b5479070e70b51f5e6243d37ee65f6a0a1419bb642ac227754c15ee74d556f367ea1fc2e0e15d55ab6621473d4309d65677d3c51e186e035ffa922c4feb6ea6620c13ab15b1ba811474bdd043b6c9822581f36c607efca6cbedac6a7fc919a5f9c61fb37b35177f8a0ba4a5a48a30eadd765d3c1e3c7b84eb470cea080f84be21324e6e", 0xad, 0x3}, {&(0x7f0000000540)="de5371413ba79546c76d9947522b99c46cdc12441288ff3d6505f176538b67b437d50c64f59e23ceeaf562125af66096c26c9e3c66b6854e10a30ade7ff6d9977287056dca0a6f32bc69b13e961829af8e65ec096cc344ad2165e7fb6dd07f8ec2ce4079fa0dbbad334cc5901e243f9365f305d02b7df8193afcebf330cf12d418823367245a4e963405ae1bc8bef66958dea0ac178e786d00ca179824047d2c2cb01605bdc6d3f94907b511195b8adbfb77e51e1765", 0xb6, 0x15}], 0x0, &(0x7f00000006c0)={[{@nodots='nodots'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}, {@fat=@nfs='nfs'}, {@dots='dots'}, {@nodots='nodots'}]}) mincore(&(0x7f0000001000/0x2000)=nil, 0x2000, &(0x7f0000000100)=""/92) 03:09:33 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x4000000}, 0x1c) 03:09:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0}, &(0x7f0000005280)=0xc) syz_mount_image$hfs(&(0x7f0000001180)="6866738c", &(0x7f0000003e00)='./file0\x00', 0x0, 0x0, &(0x7f0000005140), 0x0, &(0x7f00000052c0)={[{@uid={'uid', 0x3d, r1}}]}) 03:09:33 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) read(r2, &(0x7f0000000000)=""/126, 0xfffffeab) read(r2, &(0x7f0000000240)=""/134, 0x86) dup2(r2, r4) 03:09:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xffffffffffff4d00, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000080)={0x0, @broadcast, @remote}, &(0x7f0000000140)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000001c0)={@broadcast, @local, r1}, 0xc) mkdir(&(0x7f0000000040)='./file1\x00', 0x1) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:33 executing program 0: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={"66696c746572000000feffff0700", 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) [ 261.562873] proc: unrecognized mount option "" or missing value [ 261.572837] kasan: CONFIG_KASAN_INLINE enabled [ 261.577669] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 261.585079] general protection fault: 0000 [#1] SMP KASAN [ 261.590633] CPU: 0 PID: 21079 Comm: syz-executor5 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 261.599134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.608514] RIP: 0010:do_remount_sb+0x371/0x850 [ 261.613200] Code: ff ff ff e8 31 e1 19 05 41 89 c5 48 8b 85 30 ff ff ff 48 8d b8 e0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b5 03 00 00 48 8b 85 30 ff ff [ 261.632118] RSP: 0018:ffff8801b51d7a38 EFLAGS: 00010202 [ 261.637497] RAX: dffffc0000000000 RBX: ffff8801cdb12800 RCX: ffffc90006a32000 [ 261.644780] RDX: 000000000000001c RSI: ffffffff81eb4d4b RDI: 00000000000000e0 [ 261.652062] RBP: ffff8801b51d7b40 R08: 1ffff10036a3af01 R09: fffffbfff1001c92 03:09:33 executing program 1: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) r1 = semget(0x2, 0x6f5042c0923cc03e, 0x40) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x3]) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0xfffffffffffffc2f, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000042b0000eba900810040000000000000"], &(0x7f0000000040)={0x0, 0x0, [0x0, 0x1b2, 0x0, 0xfffffffffffffffe]}) [ 261.659344] R10: fffffbfff1001c92 R11: ffffffff8800e497 R12: ffff8801b51d7b18 [ 261.666624] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 261.673917] FS: 00007fdb4f0db700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 261.682156] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 261.688047] CR2: 0000001b33721000 CR3: 00000001ad106000 CR4: 00000000001406f0 [ 261.695333] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 261.702610] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 261.709883] Call Trace: 03:09:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:09:33 executing program 7: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x2, 0x238, [0x0, 0x20000100, 0x20000130, 0x20000268], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'team0\x00', 'veth0_to_bond\x00', 'veth0_to_bond\x00', @dev, [], @broadcast, [], 0xd8, 0xd8, 0x108, [@m802_3={'802_3\x00', 0x8}, @cluster={'cluster\x00', 0x10}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, "766c616e30860701ace235008a00", "6c6f0000008f791a4000", 'veth0_to_team\x00', 'veth1_to_bond\x00', @broadcast, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2b0) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x700}, 0x1c) [ 261.712486] ? proc_init_fs_context+0x130/0x130 [ 261.717170] ? user_get_super+0x250/0x250 [ 261.721336] ? down_write+0x8f/0x130 [ 261.725058] ? ksys_umount+0x8da/0x1310 [ 261.729045] ? down_read+0x1d0/0x1d0 [ 261.732777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.738337] ? ns_capable_common+0x13f/0x170 [ 261.742771] ksys_umount+0xfbf/0x1310 [ 261.746578] ? lock_release+0xa30/0xa30 [ 261.750561] ? dput.part.26+0x248/0x7a0 [ 261.754545] ? __detach_mounts+0x430/0x430 [ 261.758789] ? do_raw_spin_unlock+0xa7/0x2f0 [ 261.763204] ? schedule+0xfb/0x450 [ 261.766745] ? mnt_get_count+0x150/0x150 [ 261.770820] ? __schedule+0x1ec0/0x1ec0 [ 261.774795] ? shrink_dcache_sb+0x350/0x350 [ 261.779115] ? current_umask+0x70/0x70 [ 261.783004] ? __x64_sys_futex+0x47f/0x6a0 [ 261.787241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.792796] ? exit_to_usermode_loop+0x1f4/0x380 [ 261.797559] ? syscall_slow_exit_work+0x500/0x500 [ 261.802406] __x64_sys_umount+0x54/0x80 [ 261.806382] do_syscall_64+0x1b9/0x820 [ 261.810268] ? finish_task_switch+0x1d3/0x870 [ 261.814768] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.819702] ? syscall_return_slowpath+0x31d/0x5e0 [ 261.824655] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.829675] ? __switch_to_asm+0x34/0x70 [ 261.833735] ? __switch_to_asm+0x34/0x70 [ 261.837793] ? __switch_to_asm+0x40/0x70 [ 261.841849] ? __switch_to_asm+0x34/0x70 [ 261.846081] ? __switch_to_asm+0x40/0x70 [ 261.850141] ? __switch_to_asm+0x34/0x70 [ 261.854198] ? __switch_to_asm+0x40/0x70 [ 261.858258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.863106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.868292] RIP: 0033:0x456b29 [ 261.871486] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.890734] RSP: 002b:00007fdb4f0dac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 261.898704] RAX: ffffffffffffffda RBX: 00007fdb4f0db6d4 RCX: 0000000000456b29 [ 261.905980] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 261.913246] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 261.920512] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 261.927776] R13: 00000000004d60e0 R14: 00000000004c982c R15: 0000000000000001 [ 261.935132] Modules linked in: [ 261.938325] Dumping ftrace buffer: [ 261.941851] (ftrace buffer empty) [ 261.945733] ---[ end trace 9f1e87c46b616adb ]--- [ 261.950543] RIP: 0010:do_remount_sb+0x371/0x850 [ 261.955247] Code: ff ff ff e8 31 e1 19 05 41 89 c5 48 8b 85 30 ff ff ff 48 8d b8 e0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b5 03 00 00 48 8b 85 30 ff ff [ 261.974204] RSP: 0018:ffff8801b51d7a38 EFLAGS: 00010202 [ 261.979594] RAX: dffffc0000000000 RBX: ffff8801cdb12800 RCX: ffffc90006a32000 [ 261.986874] RDX: 000000000000001c RSI: ffffffff81eb4d4b RDI: 00000000000000e0 [ 261.994184] RBP: ffff8801b51d7b40 R08: 1ffff10036a3af01 R09: fffffbfff1001c92 [ 262.001490] R10: fffffbfff1001c92 R11: ffffffff8800e497 R12: ffff8801b51d7b18 [ 262.008779] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 262.016072] FS: 00007fdb4f0db700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 262.024311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 262.030205] CR2: 0000001b33721000 CR3: 00000001ad106000 CR4: 00000000001406f0 [ 262.037495] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 262.044776] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 262.052070] Kernel panic - not syncing: Fatal exception [ 262.058002] Dumping ftrace buffer: [ 262.061535] (ftrace buffer empty) [ 262.065232] Kernel Offset: disabled [ 262.068851] Rebooting in 86400 seconds..