_pages_current+0x107/0x210 [ 765.137525] get_zeroed_page+0x14/0x50 [ 765.141425] mon_alloc_buff+0xc2/0x190 [ 765.145341] mon_bin_open+0x219/0x4a0 [ 765.149153] ? mon_bin_fetch+0x340/0x340 [ 765.153222] chrdev_open+0x270/0x7c0 [ 765.156949] ? cdev_put.part.0+0x50/0x50 [ 765.161027] ? errseq_sample+0xe6/0x140 [ 765.165008] ? smack_inode_permission+0x2d4/0x3d0 [ 765.169862] ? security_file_open+0x8d/0x2a0 [ 765.174285] do_dentry_open+0x48a/0x1210 [ 765.178354] ? cdev_put.part.0+0x50/0x50 [ 765.182447] ? chown_common+0x740/0x740 [ 765.186452] ? security_inode_permission+0xd5/0x110 [ 765.191481] ? inode_permission+0xb4/0x570 [ 765.195739] vfs_open+0xa0/0xd0 [ 765.199037] path_openat+0x144f/0x5650 [ 765.202962] ? add_lock_to_list.isra.0+0x450/0x450 [ 765.207949] ? path_lookupat.isra.0+0xba0/0xba0 [ 765.212633] ? do_dup2+0x580/0x580 [ 765.216196] ? kasan_check_read+0x11/0x20 [ 765.220359] ? do_raw_spin_unlock+0xa0/0x330 [ 765.224777] ? do_raw_spin_trylock+0x270/0x270 [ 765.229369] ? __phys_addr_symbol+0x30/0x70 [ 765.233719] do_filp_open+0x26f/0x370 [ 765.237542] ? may_open_dev+0x100/0x100 [ 765.241575] ? digsig_verify.cold+0x32/0x32 [ 765.245921] ? get_unused_fd_flags+0x122/0x1a0 [ 765.250520] ? __alloc_fd+0x700/0x700 [ 765.254332] ? getname_flags+0x277/0x5b0 [ 765.258415] do_sys_open+0x59a/0x7c0 [ 765.262174] ? filp_open+0x80/0x80 [ 765.265728] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.271099] ? trace_hardirqs_off_caller+0x300/0x300 [ 765.276739] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 765.281510] __x64_sys_open+0x7e/0xc0 [ 765.285333] do_syscall_64+0x1a3/0x800 [ 765.289232] ? syscall_return_slowpath+0x5f0/0x5f0 [ 765.294185] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 765.299204] ? __switch_to_asm+0x34/0x70 [ 765.303272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.308161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.313392] RIP: 0033:0x412041 [ 765.316594] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 765.335492] RSP: 002b:00007f531d53b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 765.343195] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 765.350466] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d53b850 [ 765.357746] RBP: 000000000073bfa0 R08: 000000000000000f R09: 0000000000000000 [ 765.365020] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d53c6d4 13:20:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x279, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x26b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 765.372292] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 13:20:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:40 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsxlus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x26c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 765.465028] ebt_limit_mt_check: 8 callbacks suppressed [ 765.465037] ebt_limit: overflow, try lower: 2147483647/65537 13:20:40 executing program 2 (fault-call:1 fault-nth:50): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x26d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 765.610081] attempt to access beyond end of device [ 765.621251] loop1: rw=4096, want=136, limit=1 [ 765.625910] gfs2: error 10 reading superblock [ 765.649676] ebt_limit: overflow, try lower: 2147483647/65537 13:20:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 765.686349] FAULT_INJECTION: forcing a failure. [ 765.686349] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 765.714659] attempt to access beyond end of device [ 765.719610] loop1: rw=4096, want=136, limit=1 [ 765.731080] gfs2: error 10 reading superblock [ 765.735868] CPU: 0 PID: 6846 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 765.743018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.752384] Call Trace: [ 765.752407] dump_stack+0x1db/0x2d0 [ 765.752432] ? dump_stack_print_info.cold+0x20/0x20 [ 765.752447] ? __kernel_text_address+0xd/0x40 [ 765.752466] ? unwind_get_return_address+0x61/0xa0 [ 765.752495] should_fail.cold+0xa/0x15 [ 765.776993] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.777025] ? arch_local_save_flags+0x50/0x50 [ 765.777041] ? lock_release+0xc40/0xc40 [ 765.777059] ? __lock_is_held+0xb6/0x140 [ 765.777096] should_fail_alloc_page+0x50/0x60 [ 765.786775] __alloc_pages_nodemask+0x323/0xdc0 [ 765.786812] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 765.786844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.786882] ? __lock_is_held+0xb6/0x140 [ 765.794915] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 765.794946] alloc_pages_current+0x107/0x210 [ 765.794972] get_zeroed_page+0x14/0x50 [ 765.794991] mon_alloc_buff+0xc2/0x190 13:20:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 765.800317] ebt_limit: overflow, try lower: 2147483647/65537 [ 765.804262] mon_bin_open+0x219/0x4a0 [ 765.804285] ? mon_bin_fetch+0x340/0x340 [ 765.804302] chrdev_open+0x270/0x7c0 [ 765.804343] ? cdev_put.part.0+0x50/0x50 [ 765.804357] ? errseq_sample+0xe6/0x140 [ 765.804372] ? smack_inode_permission+0x2d4/0x3d0 [ 765.804398] ? security_file_open+0x8d/0x2a0 [ 765.814943] do_dentry_open+0x48a/0x1210 [ 765.814967] ? cdev_put.part.0+0x50/0x50 [ 765.815005] ? chown_common+0x740/0x740 [ 765.815025] ? security_inode_permission+0xd5/0x110 [ 765.815052] ? inode_permission+0xb4/0x570 [ 765.815082] vfs_open+0xa0/0xd0 [ 765.824691] path_openat+0x144f/0x5650 [ 765.824721] ? add_lock_to_list.isra.0+0x450/0x450 [ 765.824782] ? path_lookupat.isra.0+0xba0/0xba0 [ 765.824805] ? do_dup2+0x580/0x580 [ 765.833113] ? kasan_check_read+0x11/0x20 [ 765.833136] ? do_raw_spin_unlock+0xa0/0x330 [ 765.833161] ? do_raw_spin_trylock+0x270/0x270 [ 765.833183] ? __phys_addr_symbol+0x30/0x70 [ 765.833227] do_filp_open+0x26f/0x370 13:20:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 765.879832] ? may_open_dev+0x100/0x100 [ 765.879895] ? digsig_verify.cold+0x32/0x32 [ 765.879926] ? get_unused_fd_flags+0x122/0x1a0 [ 765.879947] ? __alloc_fd+0x700/0x700 [ 765.896440] ? getname_flags+0x277/0x5b0 [ 765.896479] do_sys_open+0x59a/0x7c0 [ 765.896510] ? filp_open+0x80/0x80 [ 765.896540] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.896573] ? trace_hardirqs_off_caller+0x300/0x300 [ 765.930783] ebt_limit: overflow, try lower: 2147483647/65537 [ 765.931059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 765.983989] __x64_sys_open+0x7e/0xc0 [ 765.987821] do_syscall_64+0x1a3/0x800 [ 765.991746] ? syscall_return_slowpath+0x5f0/0x5f0 [ 765.996695] ? prepare_exit_to_usermode+0x232/0x3b0 [ 765.996729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.996767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.996783] RIP: 0033:0x412041 [ 765.996801] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 13:20:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 766.006644] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 766.006663] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 766.006675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 766.006688] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 766.006700] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 766.006713] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 766.081854] ebt_limit: overflow, try lower: 2147483647/65537 13:20:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x328, 0x0, 0x0, 0x0, 0x0) 13:20:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x26e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 766.261487] attempt to access beyond end of device [ 766.267807] loop1: rw=4096, want=136, limit=1 [ 766.275174] gfs2: error 10 reading superblock 13:20:41 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp\nus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:41 executing program 2 (fault-call:1 fault-nth:51): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x26f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 766.357343] ebt_limit: overflow, try lower: 2147483647/65537 [ 766.374862] attempt to access beyond end of device [ 766.377182] __nla_parse: 16 callbacks suppressed [ 766.377191] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 766.379821] loop1: rw=4096, want=136, limit=1 [ 766.379833] gfs2: error 10 reading superblock 13:20:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x390, 0x0, 0x0, 0x0, 0x0) [ 766.404821] FAULT_INJECTION: forcing a failure. [ 766.404821] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 766.422385] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 766.478087] CPU: 0 PID: 6885 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 766.485212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.494612] Call Trace: [ 766.497219] dump_stack+0x1db/0x2d0 [ 766.500868] ? dump_stack_print_info.cold+0x20/0x20 [ 766.505903] ? __kernel_text_address+0xd/0x40 [ 766.510412] ? unwind_get_return_address+0x61/0xa0 [ 766.515397] should_fail.cold+0xa/0x15 [ 766.519317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.524448] ? arch_local_save_flags+0x50/0x50 [ 766.529053] ? lock_release+0xc40/0xc40 [ 766.533055] ? __lock_is_held+0xb6/0x140 [ 766.537160] should_fail_alloc_page+0x50/0x60 [ 766.541698] __alloc_pages_nodemask+0x323/0xdc0 [ 766.546403] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 766.551438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.557026] ? __lock_is_held+0xb6/0x140 [ 766.561110] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 766.566691] alloc_pages_current+0x107/0x210 [ 766.571129] get_zeroed_page+0x14/0x50 13:20:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 766.575062] mon_alloc_buff+0xc2/0x190 [ 766.578999] mon_bin_open+0x219/0x4a0 [ 766.582821] ? mon_bin_fetch+0x340/0x340 [ 766.586918] chrdev_open+0x270/0x7c0 [ 766.590660] ? cdev_put.part.0+0x50/0x50 [ 766.594739] ? errseq_sample+0xe6/0x140 [ 766.598733] ? smack_inode_permission+0x2d4/0x3d0 [ 766.603625] ? security_file_open+0x8d/0x2a0 [ 766.608111] do_dentry_open+0x48a/0x1210 [ 766.612193] ? cdev_put.part.0+0x50/0x50 [ 766.616291] ? chown_common+0x740/0x740 [ 766.620286] ? security_inode_permission+0xd5/0x110 [ 766.625327] ? inode_permission+0xb4/0x570 [ 766.629595] vfs_open+0xa0/0xd0 [ 766.632911] path_openat+0x144f/0x5650 [ 766.636820] ? add_lock_to_list.isra.0+0x450/0x450 [ 766.641822] ? path_lookupat.isra.0+0xba0/0xba0 [ 766.646530] ? do_dup2+0x580/0x580 [ 766.650101] ? kasan_check_read+0x11/0x20 [ 766.654266] ? do_raw_spin_unlock+0xa0/0x330 [ 766.658707] ? do_raw_spin_trylock+0x270/0x270 [ 766.663308] ? __phys_addr_symbol+0x30/0x70 [ 766.667681] do_filp_open+0x26f/0x370 [ 766.671507] ? may_open_dev+0x100/0x100 [ 766.675558] ? digsig_verify.cold+0x32/0x32 [ 766.679935] ? get_unused_fd_flags+0x122/0x1a0 [ 766.684539] ? __alloc_fd+0x700/0x700 [ 766.688368] ? getname_flags+0x277/0x5b0 [ 766.692473] do_sys_open+0x59a/0x7c0 [ 766.696243] ? filp_open+0x80/0x80 [ 766.699817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.705198] ? trace_hardirqs_off_caller+0x300/0x300 [ 766.710323] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 766.715119] __x64_sys_open+0x7e/0xc0 [ 766.718948] do_syscall_64+0x1a3/0x800 [ 766.722889] ? syscall_return_slowpath+0x5f0/0x5f0 [ 766.727859] ? prepare_exit_to_usermode+0x232/0x3b0 [ 766.732907] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.737794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.743009] RIP: 0033:0x412041 [ 766.746236] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 766.765182] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:20:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x270, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 766.772922] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 766.780196] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 766.787467] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 766.794763] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 766.802042] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 766.837845] attempt to access beyond end of device [ 766.848764] loop1: rw=4096, want=136, limit=1 [ 766.866835] gfs2: error 10 reading superblock [ 766.894956] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:20:42 executing program 2 (fault-call:1 fault-nth:52): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 766.939952] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 766.952254] ebt_limit: overflow, try lower: 2147483647/65537 13:20:42 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp#us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 767.004928] attempt to access beyond end of device [ 767.009881] loop1: rw=4096, want=136, limit=1 [ 767.042482] gfs2: error 10 reading superblock 13:20:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3d4, 0x0, 0x0, 0x0, 0x0) 13:20:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x271, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 767.079604] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 767.089381] FAULT_INJECTION: forcing a failure. [ 767.089381] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.134206] CPU: 1 PID: 6913 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 767.141344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.150706] Call Trace: [ 767.153303] dump_stack+0x1db/0x2d0 [ 767.156944] ? dump_stack_print_info.cold+0x20/0x20 [ 767.161964] ? __kernel_text_address+0xd/0x40 [ 767.166465] ? unwind_get_return_address+0x61/0xa0 [ 767.171410] should_fail.cold+0xa/0x15 [ 767.171985] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 767.175308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.175331] ? arch_local_save_flags+0x50/0x50 [ 767.175345] ? lock_release+0xc40/0xc40 [ 767.175360] ? __lock_is_held+0xb6/0x140 [ 767.175387] should_fail_alloc_page+0x50/0x60 [ 767.175408] __alloc_pages_nodemask+0x323/0xdc0 [ 767.210650] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 767.215694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.221265] ? __lock_is_held+0xb6/0x140 [ 767.225337] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 767.231005] alloc_pages_current+0x107/0x210 [ 767.235420] get_zeroed_page+0x14/0x50 [ 767.239313] mon_alloc_buff+0xc2/0x190 [ 767.243206] mon_bin_open+0x219/0x4a0 [ 767.247004] ? mon_bin_fetch+0x340/0x340 [ 767.251064] chrdev_open+0x270/0x7c0 [ 767.254792] ? cdev_put.part.0+0x50/0x50 [ 767.258903] ? errseq_sample+0xe6/0x140 [ 767.262902] ? smack_inode_permission+0x2d4/0x3d0 [ 767.267861] ? security_file_open+0x8d/0x2a0 [ 767.272272] do_dentry_open+0x48a/0x1210 [ 767.276448] ? cdev_put.part.0+0x50/0x50 [ 767.280510] ? chown_common+0x740/0x740 [ 767.284484] ? security_inode_permission+0xd5/0x110 [ 767.289506] ? inode_permission+0xb4/0x570 [ 767.293754] vfs_open+0xa0/0xd0 [ 767.297050] path_openat+0x144f/0x5650 [ 767.300940] ? add_lock_to_list.isra.0+0x450/0x450 [ 767.305922] ? path_lookupat.isra.0+0xba0/0xba0 [ 767.310620] ? do_dup2+0x580/0x580 [ 767.314191] ? kasan_check_read+0x11/0x20 [ 767.318349] ? do_raw_spin_unlock+0xa0/0x330 [ 767.322776] ? do_raw_spin_trylock+0x270/0x270 [ 767.327371] ? __phys_addr_symbol+0x30/0x70 [ 767.331727] do_filp_open+0x26f/0x370 [ 767.335542] ? may_open_dev+0x100/0x100 [ 767.339549] ? digsig_verify.cold+0x32/0x32 [ 767.343896] ? get_unused_fd_flags+0x122/0x1a0 [ 767.348488] ? __alloc_fd+0x700/0x700 [ 767.352299] ? getname_flags+0x277/0x5b0 [ 767.356377] do_sys_open+0x59a/0x7c0 [ 767.360129] ? filp_open+0x80/0x80 [ 767.363699] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.369093] ? trace_hardirqs_off_caller+0x300/0x300 [ 767.374209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 767.378982] __x64_sys_open+0x7e/0xc0 [ 767.383151] do_syscall_64+0x1a3/0x800 [ 767.387051] ? syscall_return_slowpath+0x5f0/0x5f0 [ 767.392013] ? prepare_exit_to_usermode+0x232/0x3b0 [ 767.397052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.401930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.407125] RIP: 0033:0x412041 [ 767.410325] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 13:20:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x272, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x280, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 767.429238] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 767.436979] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 767.444248] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 767.451517] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 767.458784] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 767.466047] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 767.481112] ebt_limit: overflow, try lower: 2147483647/65537 [ 767.504203] net_ratelimit: 21 callbacks suppressed [ 767.504211] protocol 88fb is buggy, dev hsr_slave_0 [ 767.514260] protocol 88fb is buggy, dev hsr_slave_1 [ 767.519357] protocol 88fb is buggy, dev hsr_slave_0 [ 767.524451] protocol 88fb is buggy, dev hsr_slave_1 13:20:42 executing program 2 (fault-call:1 fault-nth:53): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 767.567265] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 767.598407] attempt to access beyond end of device [ 767.604667] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 767.632814] loop1: rw=4096, want=136, limit=1 [ 767.653470] gfs2: error 10 reading superblock 13:20:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x273, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 767.687290] attempt to access beyond end of device [ 767.692243] loop1: rw=4096, want=136, limit=1 [ 767.693616] ebt_limit: overflow, try lower: 2147483647/65537 [ 767.709438] gfs2: error 10 reading superblock [ 767.744983] FAULT_INJECTION: forcing a failure. [ 767.744983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.771882] CPU: 0 PID: 6939 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 767.779007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.788376] Call Trace: [ 767.790992] dump_stack+0x1db/0x2d0 13:20:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x281, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 767.794647] ? dump_stack_print_info.cold+0x20/0x20 [ 767.799670] ? __kernel_text_address+0xd/0x40 [ 767.804176] ? unwind_get_return_address+0x61/0xa0 [ 767.809134] should_fail.cold+0xa/0x15 [ 767.813054] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.818189] ? arch_local_save_flags+0x50/0x50 [ 767.822796] ? lock_release+0xc40/0xc40 [ 767.826789] ? __lock_is_held+0xb6/0x140 [ 767.830905] should_fail_alloc_page+0x50/0x60 [ 767.835453] __alloc_pages_nodemask+0x323/0xdc0 [ 767.840154] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 13:20:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3ea, 0x0, 0x0, 0x0, 0x0) [ 767.845187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.850758] ? __lock_is_held+0xb6/0x140 [ 767.850798] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 767.860418] alloc_pages_current+0x107/0x210 [ 767.864885] get_zeroed_page+0x14/0x50 [ 767.868793] mon_alloc_buff+0xc2/0x190 [ 767.872709] mon_bin_open+0x219/0x4a0 [ 767.876534] ? mon_bin_fetch+0x340/0x340 [ 767.880623] chrdev_open+0x270/0x7c0 [ 767.884364] ? cdev_put.part.0+0x50/0x50 [ 767.888440] ? errseq_sample+0xe6/0x140 13:20:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 767.892425] ? smack_inode_permission+0x2d4/0x3d0 [ 767.897289] ? security_file_open+0x8d/0x2a0 [ 767.901722] do_dentry_open+0x48a/0x1210 [ 767.905805] ? cdev_put.part.0+0x50/0x50 [ 767.909883] ? chown_common+0x740/0x740 [ 767.913881] ? security_inode_permission+0xd5/0x110 [ 767.918918] ? inode_permission+0xb4/0x570 [ 767.923209] vfs_open+0xa0/0xd0 [ 767.926505] path_openat+0x144f/0x5650 [ 767.930420] ? add_lock_to_list.isra.0+0x450/0x450 [ 767.935399] ? path_lookupat.isra.0+0xba0/0xba0 [ 767.940095] ? do_dup2+0x580/0x580 [ 767.943673] ? kasan_check_read+0x11/0x20 [ 767.947843] ? do_raw_spin_unlock+0xa0/0x330 [ 767.952274] ? do_raw_spin_trylock+0x270/0x270 [ 767.956868] ? __phys_addr_symbol+0x30/0x70 [ 767.961226] do_filp_open+0x26f/0x370 [ 767.965073] ? may_open_dev+0x100/0x100 [ 767.969102] ? digsig_verify.cold+0x32/0x32 [ 767.973453] ? get_unused_fd_flags+0x122/0x1a0 [ 767.978151] ? __alloc_fd+0x700/0x700 [ 767.981965] ? getname_flags+0x277/0x5b0 [ 767.986059] do_sys_open+0x59a/0x7c0 [ 767.989798] ? filp_open+0x80/0x80 [ 767.993379] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.998775] ? trace_hardirqs_off_caller+0x300/0x300 [ 768.003916] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 768.008700] __x64_sys_open+0x7e/0xc0 [ 768.012517] do_syscall_64+0x1a3/0x800 [ 768.016445] ? syscall_return_slowpath+0x5f0/0x5f0 [ 768.021394] ? prepare_exit_to_usermode+0x232/0x3b0 [ 768.026446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.031324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.036526] RIP: 0033:0x412041 [ 768.039733] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 768.058650] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 768.066375] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 768.073658] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 768.080947] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 768.088244] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 13:20:43 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp%us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 768.095531] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 768.124898] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:20:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x274, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 768.223402] protocol 88fb is buggy, dev hsr_slave_0 [ 768.223443] protocol 88fb is buggy, dev hsr_slave_1 [ 768.228538] protocol 88fb is buggy, dev hsr_slave_1 [ 768.233566] protocol 88fb is buggy, dev hsr_slave_0 [ 768.243605] protocol 88fb is buggy, dev hsr_slave_1 [ 768.257930] attempt to access beyond end of device [ 768.266871] ebt_limit: overflow, try lower: 2147483647/65537 13:20:43 executing program 2 (fault-call:1 fault-nth:54): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 768.287461] loop1: rw=4096, want=136, limit=1 [ 768.292476] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 768.308288] gfs2: error 10 reading superblock 13:20:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x282, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x275, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f0, 0x0, 0x0, 0x0, 0x0) [ 768.478720] FAULT_INJECTION: forcing a failure. [ 768.478720] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:20:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x283, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 768.520523] CPU: 0 PID: 6968 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 768.527662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.537029] Call Trace: [ 768.539632] dump_stack+0x1db/0x2d0 [ 768.543296] ? dump_stack_print_info.cold+0x20/0x20 [ 768.548331] ? __kernel_text_address+0xd/0x40 [ 768.552857] ? unwind_get_return_address+0x61/0xa0 [ 768.557824] should_fail.cold+0xa/0x15 [ 768.561769] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.566907] ? arch_local_save_flags+0x50/0x50 [ 768.571518] ? lock_release+0xc40/0xc40 [ 768.575503] ? __lock_is_held+0xb6/0x140 [ 768.579603] should_fail_alloc_page+0x50/0x60 [ 768.584122] __alloc_pages_nodemask+0x323/0xdc0 [ 768.588829] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 768.593886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.599448] ? __lock_is_held+0xb6/0x140 [ 768.603551] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 768.609125] alloc_pages_current+0x107/0x210 [ 768.613563] get_zeroed_page+0x14/0x50 13:20:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x284, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 768.617468] mon_alloc_buff+0xc2/0x190 [ 768.621376] mon_bin_open+0x219/0x4a0 [ 768.625200] ? mon_bin_fetch+0x340/0x340 [ 768.629291] chrdev_open+0x270/0x7c0 [ 768.633030] ? cdev_put.part.0+0x50/0x50 [ 768.637111] ? errseq_sample+0xe6/0x140 [ 768.641145] ? smack_inode_permission+0x2d4/0x3d0 [ 768.646092] ? security_file_open+0x8d/0x2a0 [ 768.650534] do_dentry_open+0x48a/0x1210 [ 768.654631] ? cdev_put.part.0+0x50/0x50 [ 768.658719] ? chown_common+0x740/0x740 [ 768.658739] ? security_inode_permission+0xd5/0x110 [ 768.658765] ? inode_permission+0xb4/0x570 [ 768.658793] vfs_open+0xa0/0xd0 [ 768.675286] path_openat+0x144f/0x5650 [ 768.675312] ? add_lock_to_list.isra.0+0x450/0x450 [ 768.675391] ? path_lookupat.isra.0+0xba0/0xba0 [ 768.675413] ? do_dup2+0x580/0x580 [ 768.675461] ? kasan_check_read+0x11/0x20 [ 768.692489] ? do_raw_spin_unlock+0xa0/0x330 [ 768.692513] ? do_raw_spin_trylock+0x270/0x270 [ 768.692536] ? __phys_addr_symbol+0x30/0x70 [ 768.692586] do_filp_open+0x26f/0x370 [ 768.713837] ? may_open_dev+0x100/0x100 [ 768.717847] ? digsig_verify.cold+0x32/0x32 [ 768.717888] ? get_unused_fd_flags+0x122/0x1a0 [ 768.717907] ? __alloc_fd+0x700/0x700 [ 768.730641] ? getname_flags+0x277/0x5b0 [ 768.730687] do_sys_open+0x59a/0x7c0 [ 768.730715] ? filp_open+0x80/0x80 [ 768.730741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.747439] ? trace_hardirqs_off_caller+0x300/0x300 [ 768.752565] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 768.757346] __x64_sys_open+0x7e/0xc0 [ 768.761164] do_syscall_64+0x1a3/0x800 [ 768.765061] ? syscall_return_slowpath+0x5f0/0x5f0 [ 768.765083] ? prepare_exit_to_usermode+0x232/0x3b0 [ 768.765113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.765146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.765161] RIP: 0033:0x412041 [ 768.765177] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 768.765188] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:20:44 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp*us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x285, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 768.785137] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 768.785148] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 768.785158] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 768.785170] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 768.785181] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 768.856180] attempt to access beyond end of device [ 768.861381] loop1: rw=4096, want=136, limit=1 13:20:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 768.872922] gfs2: error 10 reading superblock 13:20:44 executing program 2 (fault-call:1 fault-nth:55): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x276, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 768.943412] protocol 88fb is buggy, dev hsr_slave_0 13:20:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 768.976890] attempt to access beyond end of device [ 768.981836] loop1: rw=4096, want=136, limit=1 [ 769.012386] gfs2: error 10 reading superblock 13:20:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x286, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 769.074924] FAULT_INJECTION: forcing a failure. [ 769.074924] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 769.103731] CPU: 0 PID: 7008 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 769.110865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.120221] Call Trace: [ 769.122822] dump_stack+0x1db/0x2d0 [ 769.126464] ? dump_stack_print_info.cold+0x20/0x20 [ 769.131485] ? __kernel_text_address+0xd/0x40 [ 769.135991] ? unwind_get_return_address+0x61/0xa0 [ 769.140944] should_fail.cold+0xa/0x15 [ 769.144873] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 769.150020] ? arch_local_save_flags+0x50/0x50 [ 769.154620] ? lock_release+0xc40/0xc40 [ 769.158615] ? __lock_is_held+0xb6/0x140 [ 769.162717] should_fail_alloc_page+0x50/0x60 [ 769.167219] __alloc_pages_nodemask+0x323/0xdc0 [ 769.171915] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 769.176942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.182507] ? __lock_is_held+0xb6/0x140 [ 769.186604] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 769.192173] alloc_pages_current+0x107/0x210 [ 769.196632] get_zeroed_page+0x14/0x50 [ 769.200650] mon_alloc_buff+0xc2/0x190 [ 769.204556] mon_bin_open+0x219/0x4a0 [ 769.208406] ? mon_bin_fetch+0x340/0x340 [ 769.212489] chrdev_open+0x270/0x7c0 [ 769.216259] ? cdev_put.part.0+0x50/0x50 [ 769.220342] ? errseq_sample+0xe6/0x140 [ 769.224329] ? smack_inode_permission+0x2d4/0x3d0 [ 769.229225] ? security_file_open+0x8d/0x2a0 [ 769.233651] do_dentry_open+0x48a/0x1210 [ 769.237732] ? cdev_put.part.0+0x50/0x50 [ 769.241810] ? chown_common+0x740/0x740 [ 769.245795] ? security_inode_permission+0xd5/0x110 [ 769.250846] ? inode_permission+0xb4/0x570 [ 769.255101] vfs_open+0xa0/0xd0 [ 769.258393] path_openat+0x144f/0x5650 [ 769.262311] ? add_lock_to_list.isra.0+0x450/0x450 [ 769.267302] ? path_lookupat.isra.0+0xba0/0xba0 [ 769.272014] ? do_dup2+0x580/0x580 [ 769.275818] ? kasan_check_read+0x11/0x20 [ 769.279987] ? do_raw_spin_unlock+0xa0/0x330 [ 769.284414] ? do_raw_spin_trylock+0x270/0x270 [ 769.289012] ? __phys_addr_symbol+0x30/0x70 [ 769.293376] do_filp_open+0x26f/0x370 [ 769.297190] ? may_open_dev+0x100/0x100 [ 769.301199] ? digsig_verify.cold+0x32/0x32 [ 769.305563] ? get_unused_fd_flags+0x122/0x1a0 [ 769.310187] ? __alloc_fd+0x700/0x700 [ 769.313994] ? getname_flags+0x277/0x5b0 [ 769.318097] do_sys_open+0x59a/0x7c0 [ 769.321843] ? filp_open+0x80/0x80 [ 769.325416] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.330803] ? trace_hardirqs_off_caller+0x300/0x300 [ 769.335936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 769.340728] __x64_sys_open+0x7e/0xc0 [ 769.344541] do_syscall_64+0x1a3/0x800 [ 769.348484] ? syscall_return_slowpath+0x5f0/0x5f0 [ 769.353436] ? prepare_exit_to_usermode+0x232/0x3b0 [ 769.358476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 769.363348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.368570] RIP: 0033:0x412041 [ 769.371779] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 769.391686] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 769.399415] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 769.406709] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 769.414018] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 769.421331] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 769.428639] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f8, 0x0, 0x0, 0x0, 0x0) 13:20:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x277, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:44 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp+us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:44 executing program 2 (fault-call:1 fault-nth:56): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x287, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 769.669416] FAULT_INJECTION: forcing a failure. [ 769.669416] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 769.684795] attempt to access beyond end of device [ 769.690215] loop1: rw=4096, want=136, limit=1 [ 769.699116] CPU: 0 PID: 7031 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 769.706246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.706257] Call Trace: [ 769.706295] dump_stack+0x1db/0x2d0 [ 769.706324] ? dump_stack_print_info.cold+0x20/0x20 [ 769.706341] ? __kernel_text_address+0xd/0x40 [ 769.706363] ? unwind_get_return_address+0x61/0xa0 [ 769.706398] should_fail.cold+0xa/0x15 [ 769.706429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 769.722017] ? arch_local_save_flags+0x50/0x50 [ 769.727151] gfs2: error 10 reading superblock [ 769.731514] ? lock_release+0xc40/0xc40 [ 769.731535] ? __lock_is_held+0xb6/0x140 [ 769.731592] should_fail_alloc_page+0x50/0x60 [ 769.740354] __alloc_pages_nodemask+0x323/0xdc0 [ 769.750067] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 769.776721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.782300] ? __lock_is_held+0xb6/0x140 [ 769.786381] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 769.791989] alloc_pages_current+0x107/0x210 [ 769.796438] get_zeroed_page+0x14/0x50 [ 769.800361] mon_alloc_buff+0xc2/0x190 [ 769.804271] mon_bin_open+0x219/0x4a0 [ 769.808087] ? mon_bin_fetch+0x340/0x340 [ 769.812161] chrdev_open+0x270/0x7c0 [ 769.815903] ? cdev_put.part.0+0x50/0x50 [ 769.819978] ? errseq_sample+0xe6/0x140 [ 769.823992] ? smack_inode_permission+0x2d4/0x3d0 [ 769.828863] ? security_file_open+0x8d/0x2a0 [ 769.833316] do_dentry_open+0x48a/0x1210 [ 769.837411] ? cdev_put.part.0+0x50/0x50 [ 769.841498] ? chown_common+0x740/0x740 [ 769.845499] ? security_inode_permission+0xd5/0x110 [ 769.850540] ? inode_permission+0xb4/0x570 [ 769.854830] vfs_open+0xa0/0xd0 [ 769.858140] path_openat+0x144f/0x5650 [ 769.862096] ? add_lock_to_list.isra.0+0x450/0x450 [ 769.867098] ? path_lookupat.isra.0+0xba0/0xba0 [ 769.871790] ? do_dup2+0x580/0x580 [ 769.875371] ? kasan_check_read+0x11/0x20 [ 769.879539] ? do_raw_spin_unlock+0xa0/0x330 [ 769.883980] ? do_raw_spin_trylock+0x270/0x270 [ 769.888578] ? __phys_addr_symbol+0x30/0x70 [ 769.892934] do_filp_open+0x26f/0x370 [ 769.896745] ? may_open_dev+0x100/0x100 [ 769.900753] ? digsig_verify.cold+0x32/0x32 [ 769.905088] ? get_unused_fd_flags+0x122/0x1a0 [ 769.909693] ? __alloc_fd+0x700/0x700 [ 769.913503] ? getname_flags+0x277/0x5b0 [ 769.917599] do_sys_open+0x59a/0x7c0 [ 769.921338] ? filp_open+0x80/0x80 [ 769.924909] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.930345] ? trace_hardirqs_off_caller+0x300/0x300 [ 769.935475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 769.940247] __x64_sys_open+0x7e/0xc0 [ 769.944079] do_syscall_64+0x1a3/0x800 [ 769.947987] ? syscall_return_slowpath+0x5f0/0x5f0 [ 769.952929] ? prepare_exit_to_usermode+0x232/0x3b0 [ 769.957980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 769.962871] entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:20:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x288, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 769.968087] RIP: 0033:0x412041 [ 769.971305] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 769.990219] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 769.997937] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 770.005218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 770.012495] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 13:20:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x278, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 770.019777] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 770.027068] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:45 executing program 2 (fault-call:1 fault-nth:57): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3fa, 0x0, 0x0, 0x0, 0x0) 13:20:45 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp-us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x289, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 770.248366] attempt to access beyond end of device [ 770.258516] FAULT_INJECTION: forcing a failure. [ 770.258516] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 770.294694] loop1: rw=4096, want=136, limit=1 13:20:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x279, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 770.315649] CPU: 0 PID: 7054 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 770.322764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.332126] Call Trace: [ 770.334730] dump_stack+0x1db/0x2d0 [ 770.338395] ? dump_stack_print_info.cold+0x20/0x20 [ 770.343417] ? __kernel_text_address+0xd/0x40 [ 770.347950] ? unwind_get_return_address+0x61/0xa0 [ 770.352907] should_fail.cold+0xa/0x15 [ 770.356801] ? fault_create_debugfs_attr+0x1e0/0x1e0 13:20:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 770.361916] ? arch_local_save_flags+0x50/0x50 [ 770.366522] ? lock_release+0xc40/0xc40 [ 770.370530] ? __lock_is_held+0xb6/0x140 [ 770.374632] should_fail_alloc_page+0x50/0x60 [ 770.379144] __alloc_pages_nodemask+0x323/0xdc0 [ 770.383836] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 770.388866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.394440] ? __lock_is_held+0xb6/0x140 [ 770.398518] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 770.404083] alloc_pages_current+0x107/0x210 [ 770.408505] get_zeroed_page+0x14/0x50 [ 770.412413] mon_alloc_buff+0xc2/0x190 13:20:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 770.416310] mon_bin_open+0x219/0x4a0 [ 770.420144] ? mon_bin_fetch+0x340/0x340 [ 770.424234] chrdev_open+0x270/0x7c0 [ 770.427982] ? cdev_put.part.0+0x50/0x50 [ 770.432049] ? errseq_sample+0xe6/0x140 [ 770.436046] ? smack_inode_permission+0x2d4/0x3d0 [ 770.440901] ? security_file_open+0x8d/0x2a0 [ 770.443579] gfs2: error 10 reading superblock [ 770.445316] do_dentry_open+0x48a/0x1210 [ 770.445335] ? cdev_put.part.0+0x50/0x50 [ 770.445355] ? chown_common+0x740/0x740 [ 770.445373] ? security_inode_permission+0xd5/0x110 [ 770.445393] ? inode_permission+0xb4/0x570 [ 770.445413] vfs_open+0xa0/0xd0 [ 770.471188] path_openat+0x144f/0x5650 [ 770.471208] ? add_lock_to_list.isra.0+0x450/0x450 [ 770.471243] ? path_lookupat.isra.0+0xba0/0xba0 [ 770.471279] ? do_dup2+0x580/0x580 [ 770.483363] ? kasan_check_read+0x11/0x20 [ 770.483379] ? do_raw_spin_unlock+0xa0/0x330 [ 770.483395] ? do_raw_spin_trylock+0x270/0x270 [ 770.483412] ? __phys_addr_symbol+0x30/0x70 [ 770.483438] do_filp_open+0x26f/0x370 [ 770.483464] ? may_open_dev+0x100/0x100 [ 770.483496] ? digsig_verify.cold+0x32/0x32 [ 770.483516] ? get_unused_fd_flags+0x122/0x1a0 [ 770.525766] ? __alloc_fd+0x700/0x700 [ 770.529579] ? getname_flags+0x277/0x5b0 [ 770.533687] do_sys_open+0x59a/0x7c0 [ 770.537416] ? filp_open+0x80/0x80 [ 770.540965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.546344] ? trace_hardirqs_off_caller+0x300/0x300 [ 770.551460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 770.556224] __x64_sys_open+0x7e/0xc0 [ 770.560049] do_syscall_64+0x1a3/0x800 [ 770.563949] ? syscall_return_slowpath+0x5f0/0x5f0 [ 770.568892] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 770.573926] ? __switch_to_asm+0x34/0x70 [ 770.577996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.582857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.588046] RIP: 0033:0x412041 [ 770.591260] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 13:20:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 770.610167] RSP: 002b:00007f531d53b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 770.617922] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 770.625202] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d53b850 [ 770.632464] RBP: 000000000073bfa0 R08: 000000000000000f R09: 0000000000000000 [ 770.639730] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d53c6d4 [ 770.647014] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:45 executing program 2 (fault-call:1 fault-nth:58): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 770.733665] ebt_limit_mt_check: 8 callbacks suppressed [ 770.733674] ebt_limit: overflow, try lower: 2147483647/65537 [ 770.763277] attempt to access beyond end of device [ 770.768900] loop1: rw=4096, want=136, limit=1 [ 770.773757] gfs2: error 10 reading superblock 13:20:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 770.798383] FAULT_INJECTION: forcing a failure. [ 770.798383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 770.829209] CPU: 1 PID: 7080 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 770.836390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.845745] Call Trace: [ 770.848359] dump_stack+0x1db/0x2d0 [ 770.852014] ? dump_stack_print_info.cold+0x20/0x20 [ 770.857044] ? __kernel_text_address+0xd/0x40 [ 770.861548] ? unwind_get_return_address+0x61/0xa0 [ 770.866499] should_fail.cold+0xa/0x15 [ 770.870403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 770.875514] ? arch_local_save_flags+0x50/0x50 [ 770.880103] ? lock_release+0xc40/0xc40 [ 770.884088] ? __lock_is_held+0xb6/0x140 [ 770.888166] should_fail_alloc_page+0x50/0x60 [ 770.892680] __alloc_pages_nodemask+0x323/0xdc0 [ 770.897376] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 770.902394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.907962] ? __lock_is_held+0xb6/0x140 [ 770.912065] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 770.917628] alloc_pages_current+0x107/0x210 [ 770.922052] get_zeroed_page+0x14/0x50 [ 770.925953] mon_alloc_buff+0xc2/0x190 [ 770.929847] mon_bin_open+0x219/0x4a0 [ 770.933654] ? mon_bin_fetch+0x340/0x340 [ 770.937731] chrdev_open+0x270/0x7c0 [ 770.941457] ? cdev_put.part.0+0x50/0x50 [ 770.945515] ? errseq_sample+0xe6/0x140 [ 770.949503] ? smack_inode_permission+0x2d4/0x3d0 [ 770.954356] ? security_file_open+0x8d/0x2a0 [ 770.958775] do_dentry_open+0x48a/0x1210 [ 770.962848] ? cdev_put.part.0+0x50/0x50 [ 770.966945] ? chown_common+0x740/0x740 [ 770.970924] ? security_inode_permission+0xd5/0x110 [ 770.975952] ? inode_permission+0xb4/0x570 [ 770.980297] vfs_open+0xa0/0xd0 [ 770.983584] path_openat+0x144f/0x5650 [ 770.987493] ? add_lock_to_list.isra.0+0x450/0x450 [ 770.992448] ? path_lookupat.isra.0+0xba0/0xba0 [ 770.997119] ? do_dup2+0x580/0x580 [ 771.000673] ? kasan_check_read+0x11/0x20 [ 771.004838] ? do_raw_spin_unlock+0xa0/0x330 [ 771.009278] ? do_raw_spin_trylock+0x270/0x270 [ 771.013873] ? __phys_addr_symbol+0x30/0x70 [ 771.018214] do_filp_open+0x26f/0x370 [ 771.022051] ? may_open_dev+0x100/0x100 [ 771.026052] ? digsig_verify.cold+0x32/0x32 [ 771.030387] ? get_unused_fd_flags+0x122/0x1a0 [ 771.034989] ? __alloc_fd+0x700/0x700 [ 771.038804] ? getname_flags+0x277/0x5b0 [ 771.042909] do_sys_open+0x59a/0x7c0 [ 771.046632] ? filp_open+0x80/0x80 [ 771.050185] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.055553] ? trace_hardirqs_off_caller+0x300/0x300 [ 771.060665] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 771.065458] __x64_sys_open+0x7e/0xc0 [ 771.069270] do_syscall_64+0x1a3/0x800 [ 771.073176] ? syscall_return_slowpath+0x5f0/0x5f0 [ 771.078124] ? prepare_exit_to_usermode+0x232/0x3b0 [ 771.083154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.088017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.093216] RIP: 0033:0x412041 [ 771.096409] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 771.115314] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 771.123053] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 771.130339] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 771.137627] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 13:20:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 771.144896] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 771.152166] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:46 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp.us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) [ 771.219533] ebt_limit: overflow, try lower: 2147483647/65537 13:20:46 executing program 2 (fault-call:1 fault-nth:59): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 771.360121] FAULT_INJECTION: forcing a failure. [ 771.360121] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 771.388473] __nla_parse: 18 callbacks suppressed [ 771.388495] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 771.402731] attempt to access beyond end of device [ 771.421217] CPU: 1 PID: 7098 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 771.428327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.435308] ebt_limit: overflow, try lower: 2147483647/65537 [ 771.437676] Call Trace: [ 771.437702] dump_stack+0x1db/0x2d0 [ 771.437726] ? dump_stack_print_info.cold+0x20/0x20 [ 771.437745] ? __kernel_text_address+0xd/0x40 [ 771.459262] ? unwind_get_return_address+0x61/0xa0 [ 771.464217] should_fail.cold+0xa/0x15 [ 771.467510] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 771.468122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 771.481617] ? arch_local_save_flags+0x50/0x50 [ 771.486204] ? lock_release+0xc40/0xc40 [ 771.490182] ? __lock_is_held+0xb6/0x140 [ 771.494292] should_fail_alloc_page+0x50/0x60 [ 771.498815] __alloc_pages_nodemask+0x323/0xdc0 [ 771.503503] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 771.508534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 771.514099] ? __lock_is_held+0xb6/0x140 13:20:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 771.518172] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 771.523146] loop1: rw=4096, want=136, limit=2 [ 771.523719] alloc_pages_current+0x107/0x210 [ 771.523739] get_zeroed_page+0x14/0x50 [ 771.523754] mon_alloc_buff+0xc2/0x190 [ 771.523773] mon_bin_open+0x219/0x4a0 [ 771.528251] gfs2: error 10 reading superblock [ 771.532652] ? mon_bin_fetch+0x340/0x340 [ 771.532667] chrdev_open+0x270/0x7c0 [ 771.532686] ? cdev_put.part.0+0x50/0x50 [ 771.560488] ? errseq_sample+0xe6/0x140 [ 771.564457] ? smack_inode_permission+0x2d4/0x3d0 [ 771.569287] ? security_file_open+0x8d/0x2a0 [ 771.573686] do_dentry_open+0x48a/0x1210 [ 771.577742] ? cdev_put.part.0+0x50/0x50 [ 771.581797] ? chown_common+0x740/0x740 [ 771.585767] ? security_inode_permission+0xd5/0x110 [ 771.590775] ? inode_permission+0xb4/0x570 [ 771.595010] vfs_open+0xa0/0xd0 [ 771.598276] path_openat+0x144f/0x5650 [ 771.602149] ? add_lock_to_list.isra.0+0x450/0x450 [ 771.607069] ? path_lookupat.isra.0+0xba0/0xba0 [ 771.611761] ? do_dup2+0x580/0x580 [ 771.615301] ? kasan_check_read+0x11/0x20 [ 771.619454] ? do_raw_spin_unlock+0xa0/0x330 [ 771.623844] ? do_raw_spin_trylock+0x270/0x270 [ 771.628410] ? __phys_addr_symbol+0x30/0x70 [ 771.632725] do_filp_open+0x26f/0x370 [ 771.636520] ? may_open_dev+0x100/0x100 [ 771.640499] ? digsig_verify.cold+0x32/0x32 [ 771.644811] ? get_unused_fd_flags+0x122/0x1a0 [ 771.649381] ? __alloc_fd+0x700/0x700 [ 771.653166] ? getname_flags+0x277/0x5b0 [ 771.657237] do_sys_open+0x59a/0x7c0 [ 771.660948] ? filp_open+0x80/0x80 [ 771.664478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.669834] ? trace_hardirqs_off_caller+0x300/0x300 [ 771.674930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 771.679694] __x64_sys_open+0x7e/0xc0 [ 771.683479] do_syscall_64+0x1a3/0x800 [ 771.687362] ? syscall_return_slowpath+0x5f0/0x5f0 [ 771.692287] ? prepare_exit_to_usermode+0x232/0x3b0 [ 771.697324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.702159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.707330] RIP: 0033:0x412041 [ 771.710504] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 771.729386] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 771.737090] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 771.744383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 771.751644] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 771.758911] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 771.766185] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:47 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp/us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 771.850294] ebt_limit: overflow, try lower: 2147483647/65537 [ 771.891150] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 771.907092] attempt to access beyond end of device 13:20:47 executing program 2 (fault-call:1 fault-nth:60): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 771.940060] loop1: rw=4096, want=136, limit=2 [ 771.954236] ebt_limit: overflow, try lower: 2147483647/65537 [ 771.972564] gfs2: error 10 reading superblock 13:20:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 771.997098] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:20:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 13:20:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:47 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsp0us\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 772.111301] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 772.112044] FAULT_INJECTION: forcing a failure. [ 772.112044] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 772.149997] ebt_limit: overflow, try lower: 2147483647/65537 [ 772.181215] ebt_limit: overflow, try lower: 2147483647/65537 [ 772.192368] CPU: 0 PID: 7137 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 772.199484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.208841] Call Trace: [ 772.211444] dump_stack+0x1db/0x2d0 [ 772.215104] ? dump_stack_print_info.cold+0x20/0x20 [ 772.220176] ? __kernel_text_address+0xd/0x40 [ 772.224689] ? unwind_get_return_address+0x61/0xa0 [ 772.229648] should_fail.cold+0xa/0x15 [ 772.233613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 772.238742] ? arch_local_save_flags+0x50/0x50 [ 772.243329] ? lock_release+0xc40/0xc40 [ 772.247330] ? __lock_is_held+0xb6/0x140 [ 772.251452] should_fail_alloc_page+0x50/0x60 [ 772.255959] __alloc_pages_nodemask+0x323/0xdc0 [ 772.260662] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 772.265702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.271270] ? __lock_is_held+0xb6/0x140 [ 772.275352] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 772.280910] alloc_pages_current+0x107/0x210 [ 772.285346] get_zeroed_page+0x14/0x50 [ 772.289282] mon_alloc_buff+0xc2/0x190 [ 772.293185] mon_bin_open+0x219/0x4a0 [ 772.297003] ? mon_bin_fetch+0x340/0x340 [ 772.301075] chrdev_open+0x270/0x7c0 [ 772.304803] ? cdev_put.part.0+0x50/0x50 [ 772.308896] ? errseq_sample+0xe6/0x140 [ 772.312897] ? smack_inode_permission+0x2d4/0x3d0 [ 772.317754] ? security_file_open+0x8d/0x2a0 [ 772.322175] do_dentry_open+0x48a/0x1210 [ 772.326252] ? cdev_put.part.0+0x50/0x50 [ 772.330336] ? chown_common+0x740/0x740 [ 772.334320] ? security_inode_permission+0xd5/0x110 [ 772.339350] ? inode_permission+0xb4/0x570 [ 772.343646] vfs_open+0xa0/0xd0 [ 772.346941] path_openat+0x144f/0x5650 [ 772.350842] ? add_lock_to_list.isra.0+0x450/0x450 [ 772.355821] ? path_lookupat.isra.0+0xba0/0xba0 [ 772.360519] ? do_dup2+0x580/0x580 [ 772.364101] ? kasan_check_read+0x11/0x20 [ 772.368264] ? do_raw_spin_unlock+0xa0/0x330 [ 772.372688] ? do_raw_spin_trylock+0x270/0x270 [ 772.377303] ? __phys_addr_symbol+0x30/0x70 13:20:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 772.381703] do_filp_open+0x26f/0x370 [ 772.385517] ? may_open_dev+0x100/0x100 [ 772.389534] ? digsig_verify.cold+0x32/0x32 [ 772.393885] ? get_unused_fd_flags+0x122/0x1a0 [ 772.398479] ? __alloc_fd+0x700/0x700 [ 772.402298] ? getname_flags+0x277/0x5b0 [ 772.406393] do_sys_open+0x59a/0x7c0 [ 772.410127] ? filp_open+0x80/0x80 [ 772.413702] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.419098] ? trace_hardirqs_off_caller+0x300/0x300 [ 772.424218] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 772.429012] __x64_sys_open+0x7e/0xc0 [ 772.432844] do_syscall_64+0x1a3/0x800 [ 772.436751] ? syscall_return_slowpath+0x5f0/0x5f0 [ 772.441697] ? prepare_exit_to_usermode+0x232/0x3b0 [ 772.446740] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 772.451671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.456871] RIP: 0033:0x412041 [ 772.460073] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 772.478977] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 772.486693] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 772.493969] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 772.501258] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 772.508545] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 772.515837] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 772.523653] net_ratelimit: 19 callbacks suppressed [ 772.523663] protocol 88fb is buggy, dev hsr_slave_0 [ 772.533773] protocol 88fb is buggy, dev hsr_slave_1 [ 772.538973] protocol 88fb is buggy, dev hsr_slave_0 [ 772.544152] protocol 88fb is buggy, dev hsr_slave_1 [ 772.611897] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 772.638636] attempt to access beyond end of device [ 772.650637] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 772.655450] loop1: rw=4096, want=136, limit=3 13:20:47 executing program 2 (fault-call:1 fault-nth:61): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 772.685749] ebt_limit: overflow, try lower: 2147483647/65537 [ 772.697313] gfs2: error 10 reading superblock 13:20:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x290, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:47 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspLus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x27f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 772.808115] FAULT_INJECTION: forcing a failure. [ 772.808115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 772.831807] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 772.840779] CPU: 1 PID: 7163 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 772.847888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.847896] Call Trace: [ 772.847921] dump_stack+0x1db/0x2d0 [ 772.847948] ? dump_stack_print_info.cold+0x20/0x20 [ 772.847967] ? __kernel_text_address+0xd/0x40 [ 772.847987] ? unwind_get_return_address+0x61/0xa0 [ 772.848017] should_fail.cold+0xa/0x15 [ 772.881851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 772.886986] ? arch_local_save_flags+0x50/0x50 [ 772.891579] ? lock_release+0xc40/0xc40 [ 772.895558] ? __lock_is_held+0xb6/0x140 [ 772.899641] should_fail_alloc_page+0x50/0x60 [ 772.904163] __alloc_pages_nodemask+0x323/0xdc0 [ 772.908878] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 772.913912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.919479] ? __lock_is_held+0xb6/0x140 [ 772.923554] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 772.929117] alloc_pages_current+0x107/0x210 [ 772.933535] get_zeroed_page+0x14/0x50 [ 772.937433] mon_alloc_buff+0xc2/0x190 [ 772.941334] mon_bin_open+0x219/0x4a0 [ 772.945159] ? mon_bin_fetch+0x340/0x340 [ 772.949218] chrdev_open+0x270/0x7c0 [ 772.952962] ? cdev_put.part.0+0x50/0x50 [ 772.957060] ? errseq_sample+0xe6/0x140 [ 772.961074] ? smack_inode_permission+0x2d4/0x3d0 [ 772.965936] ? security_file_open+0x8d/0x2a0 [ 772.970368] do_dentry_open+0x48a/0x1210 [ 772.974432] ? cdev_put.part.0+0x50/0x50 [ 772.978505] ? chown_common+0x740/0x740 [ 772.982529] ? security_inode_permission+0xd5/0x110 [ 772.987580] ? inode_permission+0xb4/0x570 [ 772.991848] vfs_open+0xa0/0xd0 [ 772.995162] path_openat+0x144f/0x5650 [ 772.999066] ? add_lock_to_list.isra.0+0x450/0x450 [ 773.004041] ? path_lookupat.isra.0+0xba0/0xba0 [ 773.008719] ? do_dup2+0x580/0x580 [ 773.012278] ? kasan_check_read+0x11/0x20 [ 773.016435] ? do_raw_spin_unlock+0xa0/0x330 [ 773.020872] ? do_raw_spin_trylock+0x270/0x270 [ 773.025461] ? __phys_addr_symbol+0x30/0x70 [ 773.029814] do_filp_open+0x26f/0x370 [ 773.033627] ? may_open_dev+0x100/0x100 [ 773.037649] ? digsig_verify.cold+0x32/0x32 [ 773.041986] ? get_unused_fd_flags+0x122/0x1a0 [ 773.046606] ? __alloc_fd+0x700/0x700 [ 773.050438] ? getname_flags+0x277/0x5b0 [ 773.054513] do_sys_open+0x59a/0x7c0 [ 773.058239] ? filp_open+0x80/0x80 [ 773.061795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.067169] ? trace_hardirqs_off_caller+0x300/0x300 [ 773.072281] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 773.077058] __x64_sys_open+0x7e/0xc0 [ 773.080901] do_syscall_64+0x1a3/0x800 [ 773.084810] ? syscall_return_slowpath+0x5f0/0x5f0 [ 773.089759] ? prepare_exit_to_usermode+0x232/0x3b0 [ 773.094803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.099665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.104860] RIP: 0033:0x412041 [ 773.108072] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 773.127013] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 773.134732] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 773.142003] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 773.149286] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 773.156551] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 773.163835] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 773.193414] protocol 88fb is buggy, dev hsr_slave_0 [ 773.198543] protocol 88fb is buggy, dev hsr_slave_1 13:20:48 executing program 2 (fault-call:1 fault-nth:62): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 773.218366] attempt to access beyond end of device [ 773.227841] loop1: rw=4096, want=136, limit=3 [ 773.239709] ebt_limit: overflow, try lower: 2147483647/65537 [ 773.247440] gfs2: error 10 reading superblock [ 773.272603] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:20:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 13:20:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x291, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 773.395152] FAULT_INJECTION: forcing a failure. [ 773.395152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 773.408229] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:20:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x280, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 773.438679] ebt_limit: overflow, try lower: 2147483647/65537 [ 773.441711] CPU: 0 PID: 7180 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 773.451609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.460977] Call Trace: [ 773.463580] dump_stack+0x1db/0x2d0 [ 773.467248] ? dump_stack_print_info.cold+0x20/0x20 [ 773.472282] ? __kernel_text_address+0xd/0x40 [ 773.476801] ? unwind_get_return_address+0x61/0xa0 [ 773.481795] should_fail.cold+0xa/0x15 13:20:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x292, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 773.485705] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 773.490858] ? arch_local_save_flags+0x50/0x50 [ 773.495488] ? lock_release+0xc40/0xc40 [ 773.499475] ? __lock_is_held+0xb6/0x140 [ 773.503608] should_fail_alloc_page+0x50/0x60 [ 773.508119] __alloc_pages_nodemask+0x323/0xdc0 [ 773.512827] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 773.517893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.523493] ? __lock_is_held+0xb6/0x140 [ 773.527589] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 773.533164] alloc_pages_current+0x107/0x210 [ 773.537608] get_zeroed_page+0x14/0x50 [ 773.541521] mon_alloc_buff+0xc2/0x190 [ 773.545444] mon_bin_open+0x219/0x4a0 [ 773.549282] ? mon_bin_fetch+0x340/0x340 [ 773.553370] chrdev_open+0x270/0x7c0 [ 773.557122] ? cdev_put.part.0+0x50/0x50 [ 773.561207] ? errseq_sample+0xe6/0x140 [ 773.565210] ? smack_inode_permission+0x2d4/0x3d0 [ 773.570090] ? security_file_open+0x8d/0x2a0 [ 773.574530] do_dentry_open+0x48a/0x1210 [ 773.578624] ? cdev_put.part.0+0x50/0x50 [ 773.582730] ? chown_common+0x740/0x740 [ 773.586746] ? security_inode_permission+0xd5/0x110 [ 773.591795] ? inode_permission+0xb4/0x570 [ 773.596082] vfs_open+0xa0/0xd0 [ 773.599390] path_openat+0x144f/0x5650 [ 773.603317] ? add_lock_to_list.isra.0+0x450/0x450 [ 773.608318] ? path_lookupat.isra.0+0xba0/0xba0 [ 773.613012] ? do_dup2+0x580/0x580 [ 773.616610] ? kasan_check_read+0x11/0x20 [ 773.620796] ? do_raw_spin_unlock+0xa0/0x330 [ 773.625238] ? do_raw_spin_trylock+0x270/0x270 [ 773.629866] ? __phys_addr_symbol+0x30/0x70 [ 773.634230] do_filp_open+0x26f/0x370 [ 773.638066] ? may_open_dev+0x100/0x100 [ 773.642116] ? digsig_verify.cold+0x32/0x32 [ 773.646466] ? get_unused_fd_flags+0x122/0x1a0 [ 773.651078] ? __alloc_fd+0x700/0x700 [ 773.654904] ? getname_flags+0x277/0x5b0 [ 773.659003] do_sys_open+0x59a/0x7c0 [ 773.662745] ? filp_open+0x80/0x80 [ 773.666317] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.671702] ? trace_hardirqs_off_caller+0x300/0x300 [ 773.676845] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 773.681646] __x64_sys_open+0x7e/0xc0 [ 773.685487] do_syscall_64+0x1a3/0x800 [ 773.689399] ? syscall_return_slowpath+0x5f0/0x5f0 [ 773.694362] ? prepare_exit_to_usermode+0x232/0x3b0 [ 773.699413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.704301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.709506] RIP: 0033:0x412041 [ 773.712710] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 773.731622] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:20:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 773.739337] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 773.746612] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 773.753894] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 773.761183] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 773.768491] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:49 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspuus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 773.813880] attempt to access beyond end of device [ 773.823377] protocol 88fb is buggy, dev hsr_slave_0 [ 773.828506] protocol 88fb is buggy, dev hsr_slave_1 [ 773.833632] protocol 88fb is buggy, dev hsr_slave_0 [ 773.833671] protocol 88fb is buggy, dev hsr_slave_1 [ 773.843327] loop1: rw=4096, want=136, limit=3 [ 773.863383] gfs2: error 10 reading superblock 13:20:49 executing program 2 (fault-call:1 fault-nth:63): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x281, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 773.960452] attempt to access beyond end of device [ 773.988963] loop1: rw=4096, want=136, limit=3 13:20:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x293, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 774.011990] gfs2: error 10 reading superblock [ 774.031962] FAULT_INJECTION: forcing a failure. [ 774.031962] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:20:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x0, 0x0) 13:20:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x282, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 774.127258] CPU: 0 PID: 7214 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 774.134398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.143785] Call Trace: [ 774.146390] dump_stack+0x1db/0x2d0 [ 774.150063] ? dump_stack_print_info.cold+0x20/0x20 [ 774.155117] ? __kernel_text_address+0xd/0x40 [ 774.159655] ? unwind_get_return_address+0x61/0xa0 [ 774.164645] should_fail.cold+0xa/0x15 [ 774.168574] ? fault_create_debugfs_attr+0x1e0/0x1e0 13:20:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x283, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 774.173722] ? arch_local_save_flags+0x50/0x50 [ 774.178310] ? lock_release+0xc40/0xc40 [ 774.182297] ? __lock_is_held+0xb6/0x140 [ 774.186395] should_fail_alloc_page+0x50/0x60 [ 774.190905] __alloc_pages_nodemask+0x323/0xdc0 [ 774.195642] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 774.200703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.206297] ? __lock_is_held+0xb6/0x140 [ 774.210418] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 774.216001] alloc_pages_current+0x107/0x210 [ 774.220451] get_zeroed_page+0x14/0x50 [ 774.224392] mon_alloc_buff+0xc2/0x190 [ 774.228356] mon_bin_open+0x219/0x4a0 [ 774.232181] ? mon_bin_fetch+0x340/0x340 [ 774.236256] chrdev_open+0x270/0x7c0 [ 774.239990] ? cdev_put.part.0+0x50/0x50 [ 774.244077] ? errseq_sample+0xe6/0x140 [ 774.248058] ? smack_inode_permission+0x2d4/0x3d0 [ 774.252948] ? security_file_open+0x8d/0x2a0 [ 774.257397] do_dentry_open+0x48a/0x1210 [ 774.261506] ? cdev_put.part.0+0x50/0x50 [ 774.265607] ? chown_common+0x740/0x740 [ 774.269612] ? security_inode_permission+0xd5/0x110 [ 774.274652] ? inode_permission+0xb4/0x570 [ 774.278955] vfs_open+0xa0/0xd0 [ 774.282261] path_openat+0x144f/0x5650 [ 774.286198] ? add_lock_to_list.isra.0+0x450/0x450 [ 774.291189] ? path_lookupat.isra.0+0xba0/0xba0 [ 774.295892] ? do_dup2+0x580/0x580 [ 774.299473] ? kasan_check_read+0x11/0x20 [ 774.303646] ? do_raw_spin_unlock+0xa0/0x330 [ 774.308068] ? do_raw_spin_trylock+0x270/0x270 [ 774.312669] ? __phys_addr_symbol+0x30/0x70 [ 774.317022] do_filp_open+0x26f/0x370 [ 774.320883] ? may_open_dev+0x100/0x100 [ 774.324900] ? digsig_verify.cold+0x32/0x32 [ 774.329253] ? get_unused_fd_flags+0x122/0x1a0 [ 774.333879] ? __alloc_fd+0x700/0x700 [ 774.337723] ? getname_flags+0x277/0x5b0 [ 774.341832] do_sys_open+0x59a/0x7c0 [ 774.345603] ? filp_open+0x80/0x80 [ 774.349179] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.354568] ? trace_hardirqs_off_caller+0x300/0x300 [ 774.359727] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 774.364521] __x64_sys_open+0x7e/0xc0 [ 774.368382] do_syscall_64+0x1a3/0x800 [ 774.372285] ? syscall_return_slowpath+0x5f0/0x5f0 13:20:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 774.377237] ? prepare_exit_to_usermode+0x232/0x3b0 [ 774.382276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.387140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.392362] RIP: 0033:0x412041 [ 774.395604] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 774.414525] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:20:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x294, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 774.422253] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 774.429535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 774.436825] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 774.444109] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 774.451380] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:49 executing program 2 (fault-call:1 fault-nth:64): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:49 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl\ns\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 774.607282] attempt to access beyond end of device [ 774.652821] loop1: rw=4096, want=136, limit=4 [ 774.659447] FAULT_INJECTION: forcing a failure. [ 774.659447] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 774.661106] gfs2: error 10 reading superblock 13:20:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 774.728441] CPU: 0 PID: 7238 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 774.735643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.735654] Call Trace: [ 774.735682] dump_stack+0x1db/0x2d0 [ 774.735728] ? dump_stack_print_info.cold+0x20/0x20 [ 774.735750] ? __kernel_text_address+0xd/0x40 [ 774.735776] ? unwind_get_return_address+0x61/0xa0 [ 774.735838] should_fail.cold+0xa/0x15 [ 774.735876] ? fault_create_debugfs_attr+0x1e0/0x1e0 13:20:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x295, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 774.774833] ? arch_local_save_flags+0x50/0x50 [ 774.774849] ? lock_release+0xc40/0xc40 [ 774.774867] ? __lock_is_held+0xb6/0x140 [ 774.774906] should_fail_alloc_page+0x50/0x60 [ 774.774923] __alloc_pages_nodemask+0x323/0xdc0 [ 774.774953] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 774.774970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.775004] ? __lock_is_held+0xb6/0x140 [ 774.811413] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 774.816974] alloc_pages_current+0x107/0x210 [ 774.821403] get_zeroed_page+0x14/0x50 [ 774.825299] mon_alloc_buff+0xc2/0x190 [ 774.829220] mon_bin_open+0x219/0x4a0 [ 774.833060] ? mon_bin_fetch+0x340/0x340 [ 774.837134] chrdev_open+0x270/0x7c0 [ 774.840866] ? cdev_put.part.0+0x50/0x50 [ 774.844941] ? errseq_sample+0xe6/0x140 [ 774.848921] ? smack_inode_permission+0x2d4/0x3d0 [ 774.853792] ? security_file_open+0x8d/0x2a0 [ 774.858254] do_dentry_open+0x48a/0x1210 [ 774.862330] ? cdev_put.part.0+0x50/0x50 [ 774.866411] ? chown_common+0x740/0x740 [ 774.870392] ? security_inode_permission+0xd5/0x110 [ 774.875454] ? inode_permission+0xb4/0x570 [ 774.879720] vfs_open+0xa0/0xd0 [ 774.883020] path_openat+0x144f/0x5650 [ 774.887187] ? add_lock_to_list.isra.0+0x450/0x450 [ 774.892181] ? path_lookupat.isra.0+0xba0/0xba0 [ 774.896881] ? do_dup2+0x580/0x580 [ 774.900462] ? kasan_check_read+0x11/0x20 [ 774.904650] ? do_raw_spin_unlock+0xa0/0x330 [ 774.909074] ? do_raw_spin_trylock+0x270/0x270 [ 774.913666] ? __phys_addr_symbol+0x30/0x70 [ 774.918022] do_filp_open+0x26f/0x370 [ 774.921845] ? may_open_dev+0x100/0x100 [ 774.925870] ? digsig_verify.cold+0x32/0x32 [ 774.930246] ? get_unused_fd_flags+0x122/0x1a0 [ 774.934867] ? __alloc_fd+0x700/0x700 [ 774.938688] ? getname_flags+0x277/0x5b0 [ 774.942812] do_sys_open+0x59a/0x7c0 [ 774.946550] ? filp_open+0x80/0x80 [ 774.950120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.955491] ? trace_hardirqs_off_caller+0x300/0x300 [ 774.960646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 774.965415] __x64_sys_open+0x7e/0xc0 [ 774.969242] do_syscall_64+0x1a3/0x800 [ 774.973160] ? syscall_return_slowpath+0x5f0/0x5f0 [ 774.978117] ? prepare_exit_to_usermode+0x232/0x3b0 [ 774.983154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.988023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.993225] RIP: 0033:0x412041 [ 774.996427] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 775.015363] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:20:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x284, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 775.023114] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 775.030387] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 775.037660] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 775.044942] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 775.052249] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 775.171579] attempt to access beyond end of device [ 775.182458] loop1: rw=4096, want=136, limit=4 [ 775.203356] gfs2: error 10 reading superblock 13:20:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, 0x0) 13:20:50 executing program 2 (fault-call:1 fault-nth:65): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x296, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:50 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl#s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x285, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 775.338136] FAULT_INJECTION: forcing a failure. [ 775.338136] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 775.366655] CPU: 1 PID: 7266 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 775.373782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.383591] Call Trace: [ 775.386207] dump_stack+0x1db/0x2d0 [ 775.389844] ? dump_stack_print_info.cold+0x20/0x20 [ 775.394880] ? __kernel_text_address+0xd/0x40 [ 775.399403] ? unwind_get_return_address+0x61/0xa0 [ 775.404344] should_fail.cold+0xa/0x15 [ 775.408256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 775.413383] ? arch_local_save_flags+0x50/0x50 [ 775.417964] ? lock_release+0xc40/0xc40 [ 775.421963] ? __lock_is_held+0xb6/0x140 [ 775.426040] should_fail_alloc_page+0x50/0x60 [ 775.430532] __alloc_pages_nodemask+0x323/0xdc0 [ 775.435220] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 775.440246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.445794] ? __lock_is_held+0xb6/0x140 [ 775.449863] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 775.455414] alloc_pages_current+0x107/0x210 [ 775.459826] get_zeroed_page+0x14/0x50 [ 775.463724] mon_alloc_buff+0xc2/0x190 [ 775.467618] mon_bin_open+0x219/0x4a0 [ 775.471426] ? mon_bin_fetch+0x340/0x340 [ 775.475498] chrdev_open+0x270/0x7c0 [ 775.479216] ? cdev_put.part.0+0x50/0x50 [ 775.483286] ? errseq_sample+0xe6/0x140 [ 775.487277] ? smack_inode_permission+0x2d4/0x3d0 [ 775.492126] ? security_file_open+0x8d/0x2a0 [ 775.496570] do_dentry_open+0x48a/0x1210 [ 775.500636] ? cdev_put.part.0+0x50/0x50 [ 775.504713] ? chown_common+0x740/0x740 [ 775.508698] ? security_inode_permission+0xd5/0x110 [ 775.513730] ? inode_permission+0xb4/0x570 [ 775.517968] vfs_open+0xa0/0xd0 [ 775.521276] path_openat+0x144f/0x5650 [ 775.525169] ? add_lock_to_list.isra.0+0x450/0x450 [ 775.530158] ? path_lookupat.isra.0+0xba0/0xba0 [ 775.534853] ? do_dup2+0x580/0x580 [ 775.538401] ? kasan_check_read+0x11/0x20 [ 775.542550] ? do_raw_spin_unlock+0xa0/0x330 [ 775.546988] ? do_raw_spin_trylock+0x270/0x270 [ 775.551606] ? __phys_addr_symbol+0x30/0x70 [ 775.555947] do_filp_open+0x26f/0x370 [ 775.559751] ? may_open_dev+0x100/0x100 [ 775.563747] ? digsig_verify.cold+0x32/0x32 [ 775.568109] ? get_unused_fd_flags+0x122/0x1a0 [ 775.572706] ? __alloc_fd+0x700/0x700 [ 775.576516] ? getname_flags+0x277/0x5b0 [ 775.580664] do_sys_open+0x59a/0x7c0 [ 775.584391] ? filp_open+0x80/0x80 [ 775.587943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.593310] ? trace_hardirqs_off_caller+0x300/0x300 [ 775.598421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.603177] __x64_sys_open+0x7e/0xc0 [ 775.606985] do_syscall_64+0x1a3/0x800 [ 775.610895] ? syscall_return_slowpath+0x5f0/0x5f0 [ 775.615895] ? prepare_exit_to_usermode+0x232/0x3b0 [ 775.620921] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.625785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.630980] RIP: 0033:0x412041 [ 775.634181] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 775.653101] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 775.660806] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 775.668116] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 775.675399] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 775.682675] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 13:20:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x297, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 775.689998] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:50 executing program 2 (fault-call:1 fault-nth:66): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x286, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 775.790008] ebt_limit_mt_check: 10 callbacks suppressed [ 775.790015] ebt_limit: overflow, try lower: 2147483647/65537 13:20:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xa, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 775.844587] attempt to access beyond end of device [ 775.849876] loop1: rw=4096, want=136, limit=5 [ 775.872048] gfs2: error 10 reading superblock 13:20:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x298, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 775.899576] FAULT_INJECTION: forcing a failure. [ 775.899576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 775.913051] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 775.929301] CPU: 0 PID: 7300 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 775.936451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.945811] Call Trace: [ 775.948424] dump_stack+0x1db/0x2d0 [ 775.952075] ? dump_stack_print_info.cold+0x20/0x20 [ 775.957083] ? __kernel_text_address+0xd/0x40 [ 775.961640] ? unwind_get_return_address+0x61/0xa0 [ 775.966581] should_fail.cold+0xa/0x15 [ 775.970473] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 775.975606] ? arch_local_save_flags+0x50/0x50 [ 775.980218] ? lock_release+0xc40/0xc40 [ 775.984214] ? __lock_is_held+0xb6/0x140 [ 775.988283] should_fail_alloc_page+0x50/0x60 [ 775.992777] __alloc_pages_nodemask+0x323/0xdc0 [ 775.997453] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 776.002511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.008090] ? __lock_is_held+0xb6/0x140 [ 776.012164] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 776.017717] alloc_pages_current+0x107/0x210 [ 776.022163] get_zeroed_page+0x14/0x50 [ 776.026063] mon_alloc_buff+0xc2/0x190 [ 776.029981] mon_bin_open+0x219/0x4a0 [ 776.033813] ? mon_bin_fetch+0x340/0x340 [ 776.037880] chrdev_open+0x270/0x7c0 [ 776.041628] ? cdev_put.part.0+0x50/0x50 [ 776.045713] ? errseq_sample+0xe6/0x140 [ 776.049681] ? smack_inode_permission+0x2d4/0x3d0 [ 776.054542] ? security_file_open+0x8d/0x2a0 [ 776.058973] do_dentry_open+0x48a/0x1210 [ 776.063031] ? cdev_put.part.0+0x50/0x50 [ 776.067088] ? chown_common+0x740/0x740 [ 776.071075] ? security_inode_permission+0xd5/0x110 [ 776.076096] ? inode_permission+0xb4/0x570 [ 776.080370] vfs_open+0xa0/0xd0 [ 776.083686] path_openat+0x144f/0x5650 [ 776.087597] ? add_lock_to_list.isra.0+0x450/0x450 [ 776.092539] ? path_lookupat.isra.0+0xba0/0xba0 [ 776.097273] ? do_dup2+0x580/0x580 [ 776.100833] ? kasan_check_read+0x11/0x20 [ 776.105026] ? do_raw_spin_unlock+0xa0/0x330 [ 776.109442] ? do_raw_spin_trylock+0x270/0x270 [ 776.114029] ? __phys_addr_symbol+0x30/0x70 [ 776.118368] do_filp_open+0x26f/0x370 [ 776.122177] ? may_open_dev+0x100/0x100 [ 776.126170] ? digsig_verify.cold+0x32/0x32 [ 776.130510] ? get_unused_fd_flags+0x122/0x1a0 [ 776.135097] ? __alloc_fd+0x700/0x700 [ 776.138907] ? getname_flags+0x277/0x5b0 [ 776.142975] do_sys_open+0x59a/0x7c0 [ 776.146708] ? filp_open+0x80/0x80 [ 776.150284] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.155672] ? trace_hardirqs_off_caller+0x300/0x300 [ 776.160796] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 776.165608] __x64_sys_open+0x7e/0xc0 [ 776.169416] do_syscall_64+0x1a3/0x800 [ 776.173314] ? syscall_return_slowpath+0x5f0/0x5f0 [ 776.178257] ? prepare_exit_to_usermode+0x232/0x3b0 [ 776.183281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.188131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.193316] RIP: 0033:0x412041 [ 776.196513] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 776.215430] RSP: 002b:00007f531d53b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 776.223133] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 776.230393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d53b850 [ 776.237671] RBP: 000000000073bfa0 R08: 000000000000000f R09: 0000000000000000 [ 776.244933] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d53c6d4 [ 776.252200] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000003 13:20:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, 0x0) 13:20:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x10, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x287, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:51 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl%s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:51 executing program 2 (fault-call:1 fault-nth:67): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x25, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 776.419772] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 776.440188] __nla_parse: 14 callbacks suppressed [ 776.440198] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:20:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x299, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 776.527083] attempt to access beyond end of device [ 776.532028] loop1: rw=4096, want=136, limit=5 [ 776.546080] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 776.559504] FAULT_INJECTION: forcing a failure. [ 776.559504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 776.561559] gfs2: error 10 reading superblock 13:20:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x60, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 776.592735] CPU: 1 PID: 7323 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 776.599849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.609230] Call Trace: [ 776.611837] dump_stack+0x1db/0x2d0 [ 776.615481] ? dump_stack_print_info.cold+0x20/0x20 [ 776.620491] ? __kernel_text_address+0xd/0x40 [ 776.624999] ? unwind_get_return_address+0x61/0xa0 [ 776.629937] should_fail.cold+0xa/0x15 [ 776.633823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 776.638937] ? arch_local_save_flags+0x50/0x50 [ 776.643517] ? lock_release+0xc40/0xc40 [ 776.647484] ? __lock_is_held+0xb6/0x140 [ 776.651552] should_fail_alloc_page+0x50/0x60 [ 776.656050] __alloc_pages_nodemask+0x323/0xdc0 [ 776.660725] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 776.665783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.671329] ? __lock_is_held+0xb6/0x140 [ 776.675394] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 776.680936] alloc_pages_current+0x107/0x210 [ 776.685345] get_zeroed_page+0x14/0x50 [ 776.689226] mon_alloc_buff+0xc2/0x190 [ 776.693132] mon_bin_open+0x219/0x4a0 [ 776.696931] ? mon_bin_fetch+0x340/0x340 [ 776.700998] chrdev_open+0x270/0x7c0 [ 776.704712] ? cdev_put.part.0+0x50/0x50 [ 776.708775] ? errseq_sample+0xe6/0x140 [ 776.712740] ? smack_inode_permission+0x2d4/0x3d0 [ 776.717591] ? security_file_open+0x8d/0x2a0 [ 776.722024] do_dentry_open+0x48a/0x1210 [ 776.726103] ? cdev_put.part.0+0x50/0x50 [ 776.730182] ? chown_common+0x740/0x740 [ 776.734152] ? security_inode_permission+0xd5/0x110 [ 776.739166] ? inode_permission+0xb4/0x570 [ 776.743404] vfs_open+0xa0/0xd0 [ 776.746708] path_openat+0x144f/0x5650 [ 776.750626] ? add_lock_to_list.isra.0+0x450/0x450 [ 776.755608] ? path_lookupat.isra.0+0xba0/0xba0 [ 776.760304] ? do_dup2+0x580/0x580 [ 776.763867] ? kasan_check_read+0x11/0x20 [ 776.768009] ? do_raw_spin_unlock+0xa0/0x330 [ 776.772446] ? do_raw_spin_trylock+0x270/0x270 [ 776.777025] ? __phys_addr_symbol+0x30/0x70 [ 776.781353] do_filp_open+0x26f/0x370 [ 776.785169] ? may_open_dev+0x100/0x100 [ 776.789169] ? digsig_verify.cold+0x32/0x32 [ 776.793503] ? get_unused_fd_flags+0x122/0x1a0 [ 776.798097] ? __alloc_fd+0x700/0x700 [ 776.801910] ? getname_flags+0x277/0x5b0 [ 776.805984] do_sys_open+0x59a/0x7c0 [ 776.809706] ? filp_open+0x80/0x80 [ 776.813253] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.818639] ? trace_hardirqs_off_caller+0x300/0x300 [ 776.823769] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 776.828528] __x64_sys_open+0x7e/0xc0 [ 776.832330] do_syscall_64+0x1a3/0x800 [ 776.836218] ? syscall_return_slowpath+0x5f0/0x5f0 [ 776.841143] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 776.846177] ? __switch_to_asm+0x34/0x70 [ 776.850245] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.855107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.860293] RIP: 0033:0x412041 [ 776.863485] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 776.882381] RSP: 002b:00007f531d53b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:20:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x288, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 776.890311] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 776.897577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d53b850 [ 776.904864] RBP: 000000000073bfa0 R08: 000000000000000f R09: 0000000000000000 [ 776.912136] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d53c6d4 [ 776.919400] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 776.930373] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:20:52 executing program 2 (fault-call:1 fault-nth:68): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 776.999759] ebt_limit: overflow, try lower: 2147483647/65537 13:20:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 777.041251] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:20:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, 0x0) 13:20:52 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl*s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x2, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x289, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 777.174363] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 777.211774] attempt to access beyond end of device [ 777.217715] FAULT_INJECTION: forcing a failure. [ 777.217715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 777.238433] CPU: 0 PID: 7342 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 777.238729] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 777.245543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.245550] Call Trace: [ 777.245572] dump_stack+0x1db/0x2d0 [ 777.245600] ? dump_stack_print_info.cold+0x20/0x20 [ 777.245616] ? __kernel_text_address+0xd/0x40 [ 777.245636] ? unwind_get_return_address+0x61/0xa0 [ 777.245673] should_fail.cold+0xa/0x15 [ 777.245707] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 777.245743] ? arch_local_save_flags+0x50/0x50 [ 777.245757] ? lock_release+0xc40/0xc40 [ 777.245773] ? __lock_is_held+0xb6/0x140 [ 777.245799] should_fail_alloc_page+0x50/0x60 [ 777.245817] __alloc_pages_nodemask+0x323/0xdc0 [ 777.264648] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 777.266210] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 777.266227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.266252] ? __lock_is_held+0xb6/0x140 [ 777.266281] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 777.266300] alloc_pages_current+0x107/0x210 [ 777.323674] loop1: rw=4096, want=136, limit=6 [ 777.323851] get_zeroed_page+0x14/0x50 [ 777.336151] gfs2: error 10 reading superblock [ 777.338431] mon_alloc_buff+0xc2/0x190 [ 777.338451] mon_bin_open+0x219/0x4a0 [ 777.338468] ? mon_bin_fetch+0x340/0x340 [ 777.338480] chrdev_open+0x270/0x7c0 [ 777.338497] ? cdev_put.part.0+0x50/0x50 [ 777.380792] ? errseq_sample+0xe6/0x140 [ 777.384878] ? smack_inode_permission+0x2d4/0x3d0 [ 777.390581] ? security_file_open+0x8d/0x2a0 [ 777.394996] do_dentry_open+0x48a/0x1210 [ 777.399075] ? cdev_put.part.0+0x50/0x50 [ 777.403172] ? chown_common+0x740/0x740 [ 777.407157] ? security_inode_permission+0xd5/0x110 [ 777.412194] ? inode_permission+0xb4/0x570 [ 777.416476] vfs_open+0xa0/0xd0 [ 777.419823] path_openat+0x144f/0x5650 [ 777.423736] ? add_lock_to_list.isra.0+0x450/0x450 [ 777.428723] ? path_lookupat.isra.0+0xba0/0xba0 [ 777.433400] ? do_dup2+0x580/0x580 [ 777.436988] ? kasan_check_read+0x11/0x20 [ 777.441136] ? do_raw_spin_unlock+0xa0/0x330 [ 777.445543] ? do_raw_spin_trylock+0x270/0x270 [ 777.450172] ? __phys_addr_symbol+0x30/0x70 [ 777.454510] do_filp_open+0x26f/0x370 [ 777.458317] ? may_open_dev+0x100/0x100 [ 777.462312] ? digsig_verify.cold+0x32/0x32 [ 777.466643] ? get_unused_fd_flags+0x122/0x1a0 [ 777.471227] ? __alloc_fd+0x700/0x700 [ 777.475030] ? getname_flags+0x277/0x5b0 [ 777.479115] do_sys_open+0x59a/0x7c0 [ 777.482839] ? filp_open+0x80/0x80 [ 777.486382] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.491750] ? trace_hardirqs_off_caller+0x300/0x300 [ 777.496850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 777.501626] __x64_sys_open+0x7e/0xc0 [ 777.505430] do_syscall_64+0x1a3/0x800 [ 777.509326] ? syscall_return_slowpath+0x5f0/0x5f0 [ 777.514258] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 777.519281] ? __switch_to_asm+0x34/0x70 [ 777.523374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.528272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.533464] RIP: 0033:0x412041 [ 777.536664] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 777.555575] RSP: 002b:00007f531d53b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 777.563314] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 13:20:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x3, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 777.570597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d53b850 [ 777.577885] RBP: 000000000073bfa0 R08: 000000000000000f R09: 0000000000000000 [ 777.585153] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d53c6d4 [ 777.592414] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 777.599951] net_ratelimit: 18 callbacks suppressed [ 777.599960] protocol 88fb is buggy, dev hsr_slave_0 [ 777.610003] protocol 88fb is buggy, dev hsr_slave_1 13:20:52 executing program 2 (fault-call:1 fault-nth:69): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 777.717237] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 777.733100] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 777.747250] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:20:52 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl+s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x5, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 777.774066] attempt to access beyond end of device [ 777.779017] loop1: rw=4096, want=136, limit=6 [ 777.802377] gfs2: error 10 reading superblock 13:20:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 777.862879] FAULT_INJECTION: forcing a failure. [ 777.862879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 777.878491] CPU: 0 PID: 7370 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 777.885695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.895050] Call Trace: [ 777.897651] dump_stack+0x1db/0x2d0 [ 777.901326] ? dump_stack_print_info.cold+0x20/0x20 [ 777.906356] ? __kernel_text_address+0xd/0x40 [ 777.910884] ? unwind_get_return_address+0x61/0xa0 [ 777.915860] should_fail.cold+0xa/0x15 [ 777.919783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 777.924921] ? arch_local_save_flags+0x50/0x50 [ 777.929545] ? lock_release+0xc40/0xc40 [ 777.933540] ? __lock_is_held+0xb6/0x140 [ 777.937660] should_fail_alloc_page+0x50/0x60 [ 777.942186] __alloc_pages_nodemask+0x323/0xdc0 [ 777.946883] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 777.951916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.957496] ? __lock_is_held+0xb6/0x140 [ 777.961597] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 777.967155] alloc_pages_current+0x107/0x210 [ 777.971598] get_zeroed_page+0x14/0x50 [ 777.975549] mon_alloc_buff+0xc2/0x190 [ 777.979489] mon_bin_open+0x219/0x4a0 [ 777.983304] ? mon_bin_fetch+0x340/0x340 [ 777.983469] protocol 88fb is buggy, dev hsr_slave_0 [ 777.987393] chrdev_open+0x270/0x7c0 [ 777.992441] protocol 88fb is buggy, dev hsr_slave_1 [ 777.996145] ? cdev_put.part.0+0x50/0x50 [ 777.996159] ? errseq_sample+0xe6/0x140 [ 777.996174] ? smack_inode_permission+0x2d4/0x3d0 [ 777.996199] ? security_file_open+0x8d/0x2a0 [ 778.001273] protocol 88fb is buggy, dev hsr_slave_0 [ 778.005284] do_dentry_open+0x48a/0x1210 [ 778.005316] ? cdev_put.part.0+0x50/0x50 [ 778.005339] ? chown_common+0x740/0x740 [ 778.009328] protocol 88fb is buggy, dev hsr_slave_1 [ 778.014128] ? security_inode_permission+0xd5/0x110 [ 778.014156] ? inode_permission+0xb4/0x570 [ 778.014185] vfs_open+0xa0/0xd0 [ 778.053225] path_openat+0x144f/0x5650 [ 778.057139] ? add_lock_to_list.isra.0+0x450/0x450 [ 778.062112] ? path_lookupat.isra.0+0xba0/0xba0 [ 778.066798] ? do_dup2+0x580/0x580 [ 778.070360] ? kasan_check_read+0x11/0x20 [ 778.074531] ? do_raw_spin_unlock+0xa0/0x330 [ 778.078958] ? do_raw_spin_trylock+0x270/0x270 [ 778.083596] ? __phys_addr_symbol+0x30/0x70 [ 778.088009] do_filp_open+0x26f/0x370 [ 778.091816] ? may_open_dev+0x100/0x100 [ 778.095833] ? digsig_verify.cold+0x32/0x32 [ 778.100186] ? get_unused_fd_flags+0x122/0x1a0 [ 778.104819] ? __alloc_fd+0x700/0x700 [ 778.108630] ? getname_flags+0x277/0x5b0 [ 778.112720] do_sys_open+0x59a/0x7c0 [ 778.116482] ? filp_open+0x80/0x80 [ 778.120052] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.125441] ? trace_hardirqs_off_caller+0x300/0x300 [ 778.130572] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 778.135364] __x64_sys_open+0x7e/0xc0 [ 778.139175] do_syscall_64+0x1a3/0x800 [ 778.143086] ? syscall_return_slowpath+0x5f0/0x5f0 [ 778.148041] ? prepare_exit_to_usermode+0x232/0x3b0 [ 778.153086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.157958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.163152] RIP: 0033:0x412041 [ 778.166356] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 778.185257] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 778.193002] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 778.200296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 13:20:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) 13:20:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 778.207580] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 778.214898] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 778.222182] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 778.236023] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 778.288040] kernel msg: ebtables bug: please report to author: Total nentries is wrong 13:20:53 executing program 2 (fault-call:1 fault-nth:70): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x6, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 778.339322] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 778.358044] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:20:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 778.432327] attempt to access beyond end of device [ 778.445839] loop1: rw=4096, want=136, limit=7 [ 778.460063] gfs2: error 10 reading superblock [ 778.497539] FAULT_INJECTION: forcing a failure. [ 778.497539] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 778.525840] kernel msg: ebtables bug: please report to author: Total nentries is wrong 13:20:53 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl-s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 778.551397] CPU: 1 PID: 7398 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 778.558505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.567866] Call Trace: [ 778.567892] dump_stack+0x1db/0x2d0 [ 778.567914] ? dump_stack_print_info.cold+0x20/0x20 [ 778.567929] ? __kernel_text_address+0xd/0x40 [ 778.567950] ? unwind_get_return_address+0x61/0xa0 [ 778.574160] should_fail.cold+0xa/0x15 [ 778.583702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 778.583724] ? arch_local_save_flags+0x50/0x50 [ 778.583737] ? lock_release+0xc40/0xc40 [ 778.583750] ? __lock_is_held+0xb6/0x140 [ 778.583774] should_fail_alloc_page+0x50/0x60 [ 778.592572] __alloc_pages_nodemask+0x323/0xdc0 [ 778.592595] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 778.592610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.592637] ? __lock_is_held+0xb6/0x140 [ 778.602312] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 778.602334] alloc_pages_current+0x107/0x210 [ 778.602351] get_zeroed_page+0x14/0x50 [ 778.602366] mon_alloc_buff+0xc2/0x190 [ 778.610415] mon_bin_open+0x219/0x4a0 [ 778.610432] ? mon_bin_fetch+0x340/0x340 [ 778.610445] chrdev_open+0x270/0x7c0 [ 778.610462] ? cdev_put.part.0+0x50/0x50 [ 778.610475] ? errseq_sample+0xe6/0x140 [ 778.671466] ? smack_inode_permission+0x2d4/0x3d0 [ 778.676375] ? security_file_open+0x8d/0x2a0 [ 778.680788] do_dentry_open+0x48a/0x1210 [ 778.684873] ? cdev_put.part.0+0x50/0x50 [ 778.688939] ? chown_common+0x740/0x740 [ 778.692937] ? security_inode_permission+0xd5/0x110 [ 778.697963] ? inode_permission+0xb4/0x570 [ 778.702209] vfs_open+0xa0/0xd0 [ 778.705511] path_openat+0x144f/0x5650 [ 778.709406] ? add_lock_to_list.isra.0+0x450/0x450 [ 778.714352] ? path_lookupat.isra.0+0xba0/0xba0 [ 778.719027] ? do_dup2+0x580/0x580 [ 778.722602] ? kasan_check_read+0x11/0x20 [ 778.726753] ? do_raw_spin_unlock+0xa0/0x330 [ 778.731191] ? do_raw_spin_trylock+0x270/0x270 [ 778.735799] ? __phys_addr_symbol+0x30/0x70 [ 778.740137] do_filp_open+0x26f/0x370 [ 778.743959] ? may_open_dev+0x100/0x100 [ 778.747977] ? digsig_verify.cold+0x32/0x32 [ 778.752313] ? get_unused_fd_flags+0x122/0x1a0 [ 778.756899] ? __alloc_fd+0x700/0x700 [ 778.760717] ? getname_flags+0x277/0x5b0 [ 778.764795] do_sys_open+0x59a/0x7c0 [ 778.768510] ? filp_open+0x80/0x80 [ 778.772115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.777510] ? trace_hardirqs_off_caller+0x300/0x300 [ 778.782613] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 778.787397] __x64_sys_open+0x7e/0xc0 [ 778.791201] do_syscall_64+0x1a3/0x800 [ 778.795133] ? syscall_return_slowpath+0x5f0/0x5f0 [ 778.800076] ? prepare_exit_to_usermode+0x232/0x3b0 [ 778.805115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.809968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.815161] RIP: 0033:0x412041 [ 778.818371] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 778.837265] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 778.844978] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 13:20:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 778.852270] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 778.859538] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 778.866822] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 778.874095] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 778.881794] protocol 88fb is buggy, dev hsr_slave_0 [ 778.886926] protocol 88fb is buggy, dev hsr_slave_1 13:20:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x25, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 778.917725] attempt to access beyond end of device [ 778.922690] loop1: rw=4096, want=136, limit=7 [ 778.943416] protocol 88fb is buggy, dev hsr_slave_0 [ 778.948494] protocol 88fb is buggy, dev hsr_slave_1 [ 778.973666] gfs2: error 10 reading superblock 13:20:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf1b, 0x0, 0x0, 0x0, 0x0) [ 779.021279] kernel msg: ebtables bug: please report to author: Total nentries is wrong 13:20:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x300, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:54 executing program 2 (fault-call:1 fault-nth:71): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:54 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl.s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x28f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 779.207524] FAULT_INJECTION: forcing a failure. [ 779.207524] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 779.241191] attempt to access beyond end of device [ 779.252195] loop1: rw=4096, want=136, limit=7 [ 779.265365] gfs2: error 10 reading superblock [ 779.279366] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 779.281874] CPU: 1 PID: 7427 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 779.294524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.303876] Call Trace: [ 779.306469] dump_stack+0x1db/0x2d0 [ 779.310116] ? dump_stack_print_info.cold+0x20/0x20 [ 779.315132] ? __kernel_text_address+0xd/0x40 [ 779.319695] ? unwind_get_return_address+0x61/0xa0 [ 779.324645] should_fail.cold+0xa/0x15 [ 779.328552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.333670] ? arch_local_save_flags+0x50/0x50 [ 779.338253] ? lock_release+0xc40/0xc40 [ 779.342248] ? __lock_is_held+0xb6/0x140 [ 779.346345] should_fail_alloc_page+0x50/0x60 [ 779.350843] __alloc_pages_nodemask+0x323/0xdc0 [ 779.355582] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 779.360628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.366189] ? __lock_is_held+0xb6/0x140 [ 779.370276] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 779.375833] alloc_pages_current+0x107/0x210 [ 779.380254] get_zeroed_page+0x14/0x50 [ 779.384614] mon_alloc_buff+0xc2/0x190 [ 779.388520] mon_bin_open+0x219/0x4a0 [ 779.392322] ? mon_bin_fetch+0x340/0x340 [ 779.396400] chrdev_open+0x270/0x7c0 [ 779.400121] ? cdev_put.part.0+0x50/0x50 [ 779.404177] ? errseq_sample+0xe6/0x140 [ 779.408157] ? smack_inode_permission+0x2d4/0x3d0 [ 779.413003] ? security_file_open+0x8d/0x2a0 [ 779.417423] do_dentry_open+0x48a/0x1210 [ 779.421484] ? cdev_put.part.0+0x50/0x50 [ 779.425554] ? chown_common+0x740/0x740 [ 779.429541] ? security_inode_permission+0xd5/0x110 [ 779.434580] ? inode_permission+0xb4/0x570 [ 779.438827] vfs_open+0xa0/0xd0 [ 779.442137] path_openat+0x144f/0x5650 [ 779.446063] ? add_lock_to_list.isra.0+0x450/0x450 [ 779.451044] ? path_lookupat.isra.0+0xba0/0xba0 [ 779.455714] ? do_dup2+0x580/0x580 [ 779.459262] ? kasan_check_read+0x11/0x20 [ 779.463449] ? do_raw_spin_unlock+0xa0/0x330 [ 779.467878] ? do_raw_spin_trylock+0x270/0x270 [ 779.472465] ? __phys_addr_symbol+0x30/0x70 [ 779.476803] do_filp_open+0x26f/0x370 [ 779.480649] ? may_open_dev+0x100/0x100 [ 779.484685] ? digsig_verify.cold+0x32/0x32 [ 779.489016] ? get_unused_fd_flags+0x122/0x1a0 [ 779.493604] ? __alloc_fd+0x700/0x700 [ 779.497414] ? getname_flags+0x277/0x5b0 [ 779.501485] do_sys_open+0x59a/0x7c0 [ 779.505205] ? filp_open+0x80/0x80 [ 779.508815] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.514180] ? trace_hardirqs_off_caller+0x300/0x300 [ 779.519307] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.524074] __x64_sys_open+0x7e/0xc0 [ 779.527898] do_syscall_64+0x1a3/0x800 [ 779.531805] ? syscall_return_slowpath+0x5f0/0x5f0 [ 779.536760] ? prepare_exit_to_usermode+0x232/0x3b0 [ 779.541789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.546648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.551838] RIP: 0033:0x412041 [ 779.555044] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 779.573947] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 779.581657] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 779.588933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 779.596217] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 779.603494] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 13:20:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x290, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 779.610764] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x3ae, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 779.664944] attempt to access beyond end of device [ 779.669895] loop1: rw=4096, want=136, limit=7 13:20:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:54 executing program 2 (fault-call:1 fault-nth:72): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 779.710851] gfs2: error 10 reading superblock 13:20:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x291, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 779.761131] kernel msg: ebtables bug: please report to author: Total nentries is wrong 13:20:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x3b4, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, 0x0) 13:20:55 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspl0s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 779.906635] FAULT_INJECTION: forcing a failure. [ 779.906635] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 779.963176] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 779.987327] CPU: 1 PID: 7458 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 779.994451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.003811] Call Trace: [ 780.006440] dump_stack+0x1db/0x2d0 [ 780.010098] ? dump_stack_print_info.cold+0x20/0x20 [ 780.015140] ? __kernel_text_address+0xd/0x40 [ 780.019641] ? unwind_get_return_address+0x61/0xa0 [ 780.024576] should_fail.cold+0xa/0x15 [ 780.028479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 780.033616] ? arch_local_save_flags+0x50/0x50 [ 780.033633] ? lock_release+0xc40/0xc40 [ 780.033651] ? __lock_is_held+0xb6/0x140 [ 780.033683] should_fail_alloc_page+0x50/0x60 [ 780.033699] __alloc_pages_nodemask+0x323/0xdc0 [ 780.033724] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 780.060453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.065984] ? __lock_is_held+0xb6/0x140 [ 780.070060] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 780.075624] alloc_pages_current+0x107/0x210 [ 780.080046] get_zeroed_page+0x14/0x50 [ 780.083951] mon_alloc_buff+0xc2/0x190 [ 780.087866] mon_bin_open+0x219/0x4a0 [ 780.091665] ? mon_bin_fetch+0x340/0x340 [ 780.095711] chrdev_open+0x270/0x7c0 [ 780.099423] ? cdev_put.part.0+0x50/0x50 [ 780.103463] ? errseq_sample+0xe6/0x140 [ 780.107425] ? smack_inode_permission+0x2d4/0x3d0 [ 780.112258] ? security_file_open+0x8d/0x2a0 [ 780.116674] do_dentry_open+0x48a/0x1210 [ 780.120758] ? cdev_put.part.0+0x50/0x50 [ 780.124819] ? chown_common+0x740/0x740 [ 780.128787] ? security_inode_permission+0xd5/0x110 [ 780.133815] ? inode_permission+0xb4/0x570 [ 780.138048] vfs_open+0xa0/0xd0 [ 780.141308] path_openat+0x144f/0x5650 [ 780.145186] ? add_lock_to_list.isra.0+0x450/0x450 [ 780.150129] ? path_lookupat.isra.0+0xba0/0xba0 [ 780.154813] ? do_dup2+0x580/0x580 [ 780.158356] ? kasan_check_read+0x11/0x20 [ 780.162488] ? do_raw_spin_unlock+0xa0/0x330 [ 780.166882] ? do_raw_spin_trylock+0x270/0x270 [ 780.171457] ? __phys_addr_symbol+0x30/0x70 [ 780.175778] do_filp_open+0x26f/0x370 [ 780.179618] ? may_open_dev+0x100/0x100 [ 780.183635] ? digsig_verify.cold+0x32/0x32 [ 780.187962] ? get_unused_fd_flags+0x122/0x1a0 [ 780.192526] ? __alloc_fd+0x700/0x700 [ 780.196305] ? getname_flags+0x277/0x5b0 [ 780.200355] do_sys_open+0x59a/0x7c0 [ 780.204050] ? filp_open+0x80/0x80 [ 780.207583] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.212932] ? trace_hardirqs_off_caller+0x300/0x300 [ 780.218021] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 780.222759] __x64_sys_open+0x7e/0xc0 [ 780.226542] do_syscall_64+0x1a3/0x800 [ 780.230416] ? syscall_return_slowpath+0x5f0/0x5f0 [ 780.235330] ? prepare_exit_to_usermode+0x232/0x3b0 [ 780.240337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 780.245176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.250354] RIP: 0033:0x412041 [ 780.253538] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 780.272429] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 780.280127] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 780.287388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 780.294674] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 780.302119] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 13:20:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x18bfe6, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x292, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 780.309395] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:55 executing program 2 (fault-call:1 fault-nth:73): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 780.384708] attempt to access beyond end of device [ 780.390968] loop1: rw=4096, want=136, limit=8 [ 780.412265] gfs2: error 10 reading superblock 13:20:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:55 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplXs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 780.541598] attempt to access beyond end of device 13:20:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x293, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 780.568164] loop1: rw=4096, want=136, limit=8 [ 780.583646] gfs2: error 10 reading superblock [ 780.605169] kernel msg: ebtables bug: please report to author: Total nentries is wrong 13:20:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) 13:20:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 780.814727] attempt to access beyond end of device 13:20:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x294, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 780.847861] loop1: rw=4096, want=136, limit=8 [ 780.869171] gfs2: error 10 reading superblock 13:20:56 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplcs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1401, 0x0, 0x0, 0x0, 0x0) 13:20:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1ffffa, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x295, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 781.105006] FAULT_INJECTION: forcing a failure. [ 781.105006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 781.149333] CPU: 1 PID: 7515 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 781.156458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.156467] Call Trace: [ 781.156491] dump_stack+0x1db/0x2d0 [ 781.156516] ? dump_stack_print_info.cold+0x20/0x20 [ 781.156532] ? __kernel_text_address+0xd/0x40 [ 781.156553] ? unwind_get_return_address+0x61/0xa0 [ 781.156581] should_fail.cold+0xa/0x15 [ 781.177151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 781.177179] ? arch_local_save_flags+0x50/0x50 [ 781.177194] ? lock_release+0xc40/0xc40 [ 781.177212] ? __lock_is_held+0xb6/0x140 [ 781.177241] should_fail_alloc_page+0x50/0x60 [ 781.212694] __alloc_pages_nodemask+0x323/0xdc0 [ 781.217383] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 781.222410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.227974] ? __lock_is_held+0xb6/0x140 [ 781.232054] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 781.237618] alloc_pages_current+0x107/0x210 [ 781.242041] get_zeroed_page+0x14/0x50 [ 781.245937] mon_alloc_buff+0xc2/0x190 [ 781.249859] mon_bin_open+0x219/0x4a0 [ 781.253680] ? mon_bin_fetch+0x340/0x340 [ 781.257778] chrdev_open+0x270/0x7c0 [ 781.261503] ? cdev_put.part.0+0x50/0x50 [ 781.265578] ? errseq_sample+0xe6/0x140 [ 781.269572] ? smack_inode_permission+0x2d4/0x3d0 [ 781.274627] ? security_file_open+0x8d/0x2a0 [ 781.279044] do_dentry_open+0x48a/0x1210 [ 781.283136] ? cdev_put.part.0+0x50/0x50 [ 781.287210] ? chown_common+0x740/0x740 [ 781.291193] ? security_inode_permission+0xd5/0x110 [ 781.296216] ? inode_permission+0xb4/0x570 [ 781.300463] vfs_open+0xa0/0xd0 [ 781.303748] path_openat+0x144f/0x5650 [ 781.307646] ? add_lock_to_list.isra.0+0x450/0x450 [ 781.312596] ? path_lookupat.isra.0+0xba0/0xba0 [ 781.317280] ? do_dup2+0x580/0x580 [ 781.320841] ? kasan_check_read+0x11/0x20 [ 781.324999] ? do_raw_spin_unlock+0xa0/0x330 [ 781.329412] ? do_raw_spin_trylock+0x270/0x270 [ 781.334003] ? __phys_addr_symbol+0x30/0x70 [ 781.338341] do_filp_open+0x26f/0x370 [ 781.342145] ? may_open_dev+0x100/0x100 [ 781.346153] ? digsig_verify.cold+0x32/0x32 [ 781.350490] ? get_unused_fd_flags+0x122/0x1a0 [ 781.355080] ? __alloc_fd+0x700/0x700 [ 781.358891] ? getname_flags+0x277/0x5b0 [ 781.362964] do_sys_open+0x59a/0x7c0 [ 781.366693] ? filp_open+0x80/0x80 [ 781.370246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.375616] ? trace_hardirqs_off_caller+0x300/0x300 [ 781.380737] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 781.385996] __x64_sys_open+0x7e/0xc0 [ 781.389830] do_syscall_64+0x1a3/0x800 [ 781.393729] ? syscall_return_slowpath+0x5f0/0x5f0 [ 781.398664] ? prepare_exit_to_usermode+0x232/0x3b0 [ 781.403700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 781.408559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.413752] RIP: 0033:0x412041 [ 781.416981] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 781.435889] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 781.443605] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 781.450933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 781.458207] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 781.465515] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 781.472786] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 781.506461] attempt to access beyond end of device [ 781.511455] loop1: rw=4096, want=136, limit=10 [ 781.544398] __nla_parse: 17 callbacks suppressed [ 781.544407] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 781.551017] gfs2: error 10 reading superblock [ 781.663063] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 781.699872] attempt to access beyond end of device [ 781.707299] loop1: rw=4096, want=136, limit=10 [ 781.721124] gfs2: error 10 reading superblock 13:20:57 executing program 2 (fault-call:1 fault-nth:74): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x296, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:57 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplds\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1b0f, 0x0, 0x0, 0x0, 0x0) 13:20:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x7ffffff9, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 781.908035] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 781.941041] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:20:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0xffffff1f, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 781.955192] FAULT_INJECTION: forcing a failure. [ 781.955192] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 781.961408] attempt to access beyond end of device [ 781.986280] loop1: rw=4096, want=136, limit=13 [ 781.995554] CPU: 1 PID: 7548 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 782.001430] gfs2: error 10 reading superblock [ 782.002665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.002673] Call Trace: [ 782.002697] dump_stack+0x1db/0x2d0 [ 782.002721] ? dump_stack_print_info.cold+0x20/0x20 [ 782.002742] ? __kernel_text_address+0xd/0x40 [ 782.032259] ? unwind_get_return_address+0x61/0xa0 [ 782.037218] should_fail.cold+0xa/0x15 [ 782.041121] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 782.046287] ? arch_local_save_flags+0x50/0x50 [ 782.050881] ? lock_release+0xc40/0xc40 [ 782.054901] ? __lock_is_held+0xb6/0x140 [ 782.058982] should_fail_alloc_page+0x50/0x60 [ 782.063503] __alloc_pages_nodemask+0x323/0xdc0 [ 782.068207] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 782.073231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.078787] ? __lock_is_held+0xb6/0x140 [ 782.082862] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 782.088421] alloc_pages_current+0x107/0x210 [ 782.092845] get_zeroed_page+0x14/0x50 [ 782.096742] mon_alloc_buff+0xc2/0x190 [ 782.100640] mon_bin_open+0x219/0x4a0 [ 782.104450] ? mon_bin_fetch+0x340/0x340 [ 782.108511] chrdev_open+0x270/0x7c0 [ 782.112237] ? cdev_put.part.0+0x50/0x50 [ 782.116310] ? errseq_sample+0xe6/0x140 [ 782.120284] ? smack_inode_permission+0x2d4/0x3d0 [ 782.125146] ? security_file_open+0x8d/0x2a0 [ 782.129572] do_dentry_open+0x48a/0x1210 [ 782.133646] ? cdev_put.part.0+0x50/0x50 [ 782.137738] ? chown_common+0x740/0x740 [ 782.141726] ? security_inode_permission+0xd5/0x110 [ 782.146770] ? inode_permission+0xb4/0x570 [ 782.151021] vfs_open+0xa0/0xd0 [ 782.154331] path_openat+0x144f/0x5650 [ 782.158253] ? add_lock_to_list.isra.0+0x450/0x450 [ 782.163223] ? path_lookupat.isra.0+0xba0/0xba0 [ 782.167908] ? do_dup2+0x580/0x580 [ 782.171470] ? kasan_check_read+0x11/0x20 [ 782.175626] ? do_raw_spin_unlock+0xa0/0x330 [ 782.180058] ? do_raw_spin_trylock+0x270/0x270 [ 782.184669] ? __phys_addr_symbol+0x30/0x70 [ 782.189018] do_filp_open+0x26f/0x370 [ 782.192851] ? may_open_dev+0x100/0x100 [ 782.196870] ? digsig_verify.cold+0x32/0x32 [ 782.201219] ? get_unused_fd_flags+0x122/0x1a0 [ 782.205855] ? __alloc_fd+0x700/0x700 [ 782.209659] ? getname_flags+0x277/0x5b0 [ 782.213735] do_sys_open+0x59a/0x7c0 [ 782.217459] ? filp_open+0x80/0x80 [ 782.221016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.226395] ? trace_hardirqs_off_caller+0x300/0x300 [ 782.231512] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 782.236284] __x64_sys_open+0x7e/0xc0 [ 782.240113] do_syscall_64+0x1a3/0x800 [ 782.244030] ? syscall_return_slowpath+0x5f0/0x5f0 [ 782.248963] ? prepare_exit_to_usermode+0x232/0x3b0 [ 782.253996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.258868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.264066] RIP: 0033:0x412041 [ 782.267273] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 782.286209] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 782.293917] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 782.301185] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 13:20:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x297, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 782.308447] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 782.315713] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 782.322994] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:57 executing program 2 (fault-call:1 fault-nth:75): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 782.425861] attempt to access beyond end of device [ 782.430834] loop1: rw=4096, want=136, limit=13 13:20:57 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplis\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 782.473641] gfs2: error 10 reading superblock [ 782.484522] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 782.514043] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 782.533774] FAULT_INJECTION: forcing a failure. [ 782.533774] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 782.546329] kernel msg: ebtables bug: please report to author: Wrong len argument [ 782.587732] CPU: 1 PID: 7565 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 782.594853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.604205] Call Trace: [ 782.606796] dump_stack+0x1db/0x2d0 [ 782.610429] ? dump_stack_print_info.cold+0x20/0x20 [ 782.615443] ? __kernel_text_address+0xd/0x40 [ 782.619946] ? unwind_get_return_address+0x61/0xa0 [ 782.624899] should_fail.cold+0xa/0x15 [ 782.628809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 782.633923] ? arch_local_save_flags+0x50/0x50 [ 782.638507] ? lock_release+0xc40/0xc40 [ 782.642484] ? __lock_is_held+0xb6/0x140 [ 782.646590] should_fail_alloc_page+0x50/0x60 [ 782.651109] __alloc_pages_nodemask+0x323/0xdc0 [ 782.655795] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 782.660821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.666373] ? __lock_is_held+0xb6/0x140 [ 782.670438] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 782.675984] alloc_pages_current+0x107/0x210 [ 782.680401] get_zeroed_page+0x14/0x50 [ 782.684293] mon_alloc_buff+0xc2/0x190 [ 782.688213] mon_bin_open+0x219/0x4a0 [ 782.692017] ? mon_bin_fetch+0x340/0x340 [ 782.696080] chrdev_open+0x270/0x7c0 [ 782.699851] ? cdev_put.part.0+0x50/0x50 [ 782.703916] ? errseq_sample+0xe6/0x140 [ 782.707912] ? smack_inode_permission+0x2d4/0x3d0 [ 782.712806] ? security_file_open+0x8d/0x2a0 [ 782.717223] do_dentry_open+0x48a/0x1210 [ 782.721294] ? cdev_put.part.0+0x50/0x50 [ 782.725365] ? chown_common+0x740/0x740 [ 782.729343] ? security_inode_permission+0xd5/0x110 [ 782.734387] ? inode_permission+0xb4/0x570 [ 782.738633] vfs_open+0xa0/0xd0 [ 782.741930] path_openat+0x144f/0x5650 [ 782.745839] ? add_lock_to_list.isra.0+0x450/0x450 [ 782.750789] ? path_lookupat.isra.0+0xba0/0xba0 [ 782.755460] ? do_dup2+0x580/0x580 [ 782.759034] ? kasan_check_read+0x11/0x20 [ 782.763186] ? do_raw_spin_unlock+0xa0/0x330 [ 782.767633] ? do_raw_spin_trylock+0x270/0x270 [ 782.772228] ? __phys_addr_symbol+0x30/0x70 [ 782.776589] do_filp_open+0x26f/0x370 [ 782.780403] ? may_open_dev+0x100/0x100 [ 782.784406] ? digsig_verify.cold+0x32/0x32 [ 782.788755] ? get_unused_fd_flags+0x122/0x1a0 [ 782.793348] ? __alloc_fd+0x700/0x700 [ 782.797164] ? getname_flags+0x277/0x5b0 [ 782.801251] do_sys_open+0x59a/0x7c0 [ 782.804986] ? filp_open+0x80/0x80 [ 782.808574] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.813996] ? trace_hardirqs_off_caller+0x300/0x300 [ 782.819119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 782.823887] __x64_sys_open+0x7e/0xc0 [ 782.827710] do_syscall_64+0x1a3/0x800 [ 782.831633] ? syscall_return_slowpath+0x5f0/0x5f0 [ 782.836585] ? prepare_exit_to_usermode+0x232/0x3b0 [ 782.841637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.846546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.851751] RIP: 0033:0x412041 [ 782.854965] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 782.873872] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 782.881596] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 13:20:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x2f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:20:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0) [ 782.888880] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 782.896158] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 782.903433] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 782.910707] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x298, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 783.023413] net_ratelimit: 20 callbacks suppressed [ 783.023425] protocol 88fb is buggy, dev hsr_slave_0 [ 783.030251] kernel msg: ebtables bug: please report to author: Wrong len argument [ 783.033527] protocol 88fb is buggy, dev hsr_slave_1 [ 783.064286] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 783.100129] attempt to access beyond end of device [ 783.105275] protocol 88fb is buggy, dev hsr_slave_0 13:20:58 executing program 2 (fault-call:1 fault-nth:76): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 783.105338] protocol 88fb is buggy, dev hsr_slave_1 [ 783.105450] protocol 88fb is buggy, dev hsr_slave_0 [ 783.105508] protocol 88fb is buggy, dev hsr_slave_1 13:20:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 783.164980] loop1: rw=4096, want=136, limit=15 [ 783.176472] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 783.189714] FAULT_INJECTION: forcing a failure. [ 783.189714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 783.208461] gfs2: error 10 reading superblock [ 783.222218] CPU: 0 PID: 7588 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 783.229351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.238713] Call Trace: [ 783.241313] dump_stack+0x1db/0x2d0 [ 783.244958] ? dump_stack_print_info.cold+0x20/0x20 [ 783.249986] ? __kernel_text_address+0xd/0x40 [ 783.254492] ? unwind_get_return_address+0x61/0xa0 [ 783.259279] kernel msg: ebtables bug: please report to author: Wrong len argument [ 783.259442] should_fail.cold+0xa/0x15 [ 783.270982] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 783.276607] ? arch_local_save_flags+0x50/0x50 [ 783.281204] ? lock_release+0xc40/0xc40 [ 783.285196] ? __lock_is_held+0xb6/0x140 [ 783.289293] should_fail_alloc_page+0x50/0x60 [ 783.293796] __alloc_pages_nodemask+0x323/0xdc0 [ 783.298505] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 783.303529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.303579] ? __lock_is_held+0xb6/0x140 [ 783.303612] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 783.303641] alloc_pages_current+0x107/0x210 [ 783.303663] get_zeroed_page+0x14/0x50 [ 783.313278] mon_alloc_buff+0xc2/0x190 [ 783.313305] mon_bin_open+0x219/0x4a0 [ 783.313327] ? mon_bin_fetch+0x340/0x340 [ 783.313348] chrdev_open+0x270/0x7c0 [ 783.313375] ? cdev_put.part.0+0x50/0x50 [ 783.313388] ? errseq_sample+0xe6/0x140 [ 783.313402] ? smack_inode_permission+0x2d4/0x3d0 [ 783.313433] ? security_file_open+0x8d/0x2a0 [ 783.360043] do_dentry_open+0x48a/0x1210 [ 783.364123] ? cdev_put.part.0+0x50/0x50 [ 783.368258] ? chown_common+0x740/0x740 [ 783.372244] ? security_inode_permission+0xd5/0x110 [ 783.377291] ? inode_permission+0xb4/0x570 [ 783.381585] vfs_open+0xa0/0xd0 [ 783.385010] path_openat+0x144f/0x5650 [ 783.388912] ? add_lock_to_list.isra.0+0x450/0x450 [ 783.393892] ? path_lookupat.isra.0+0xba0/0xba0 [ 783.398600] ? do_dup2+0x580/0x580 [ 783.402198] ? kasan_check_read+0x11/0x20 [ 783.406399] ? do_raw_spin_unlock+0xa0/0x330 [ 783.411217] ? do_raw_spin_trylock+0x270/0x270 [ 783.415828] ? __phys_addr_symbol+0x30/0x70 [ 783.420215] do_filp_open+0x26f/0x370 [ 783.424037] ? may_open_dev+0x100/0x100 [ 783.428085] ? digsig_verify.cold+0x32/0x32 [ 783.432446] ? get_unused_fd_flags+0x122/0x1a0 [ 783.437069] ? __alloc_fd+0x700/0x700 [ 783.440905] ? getname_flags+0x277/0x5b0 [ 783.445034] do_sys_open+0x59a/0x7c0 [ 783.448775] ? filp_open+0x80/0x80 [ 783.452380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.457775] ? trace_hardirqs_off_caller+0x300/0x300 [ 783.462910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 783.467696] __x64_sys_open+0x7e/0xc0 [ 783.471558] do_syscall_64+0x1a3/0x800 [ 783.475485] ? syscall_return_slowpath+0x5f0/0x5f0 [ 783.480462] ? prepare_exit_to_usermode+0x232/0x3b0 [ 783.485506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 783.490406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.495646] RIP: 0033:0x412041 [ 783.498856] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 13:20:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x299, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 783.517780] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 783.525528] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 783.532828] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 783.540138] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 783.547464] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 783.554770] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:20:58 executing program 2 (fault-call:1 fault-nth:77): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 783.629924] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:20:58 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplls\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 783.713354] kernel msg: ebtables bug: please report to author: Wrong len argument [ 783.745135] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 783.755794] FAULT_INJECTION: forcing a failure. 13:20:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) 13:20:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x168, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 783.755794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 783.795805] CPU: 0 PID: 7603 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 783.802933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.812294] Call Trace: [ 783.812322] dump_stack+0x1db/0x2d0 [ 783.812352] ? dump_stack_print_info.cold+0x20/0x20 [ 783.812371] ? __kernel_text_address+0xd/0x40 [ 783.812395] ? unwind_get_return_address+0x61/0xa0 [ 783.812433] should_fail.cold+0xa/0x15 [ 783.833126] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 783.833159] ? arch_local_save_flags+0x50/0x50 [ 783.842138] ? lock_release+0xc40/0xc40 [ 783.850719] ? __lock_is_held+0xb6/0x140 [ 783.854846] should_fail_alloc_page+0x50/0x60 [ 783.859352] __alloc_pages_nodemask+0x323/0xdc0 [ 783.864072] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 783.869105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.874701] ? __lock_is_held+0xb6/0x140 [ 783.878799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 783.878845] alloc_pages_current+0x107/0x210 [ 783.878870] get_zeroed_page+0x14/0x50 [ 783.892704] mon_alloc_buff+0xc2/0x190 [ 783.896642] mon_bin_open+0x219/0x4a0 [ 783.900465] ? mon_bin_fetch+0x340/0x340 [ 783.904542] chrdev_open+0x270/0x7c0 [ 783.904581] ? cdev_put.part.0+0x50/0x50 [ 783.904605] ? errseq_sample+0xe6/0x140 [ 783.904625] ? smack_inode_permission+0x2d4/0x3d0 [ 783.904656] ? security_file_open+0x8d/0x2a0 [ 783.904682] do_dentry_open+0x48a/0x1210 [ 783.904702] ? cdev_put.part.0+0x50/0x50 [ 783.933832] ? chown_common+0x740/0x740 [ 783.937832] ? security_inode_permission+0xd5/0x110 [ 783.942913] ? inode_permission+0xb4/0x570 [ 783.947181] vfs_open+0xa0/0xd0 [ 783.950494] path_openat+0x144f/0x5650 [ 783.954414] ? add_lock_to_list.isra.0+0x450/0x450 [ 783.954468] ? path_lookupat.isra.0+0xba0/0xba0 [ 783.964061] ? do_dup2+0x580/0x580 [ 783.964097] ? kasan_check_read+0x11/0x20 [ 783.964116] ? do_raw_spin_unlock+0xa0/0x330 [ 783.964138] ? do_raw_spin_trylock+0x270/0x270 [ 783.964159] ? __phys_addr_symbol+0x30/0x70 [ 783.964199] do_filp_open+0x26f/0x370 [ 783.989081] ? may_open_dev+0x100/0x100 [ 783.993115] ? digsig_verify.cold+0x32/0x32 [ 783.997468] ? get_unused_fd_flags+0x122/0x1a0 [ 784.002079] ? __alloc_fd+0x700/0x700 [ 784.004844] attempt to access beyond end of device [ 784.005924] ? getname_flags+0x277/0x5b0 [ 784.005961] do_sys_open+0x59a/0x7c0 [ 784.005990] ? filp_open+0x80/0x80 [ 784.006017] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.012291] loop1: rw=4096, want=136, limit=16 [ 784.015056] ? trace_hardirqs_off_caller+0x300/0x300 [ 784.015081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 784.015109] __x64_sys_open+0x7e/0xc0 [ 784.015135] do_syscall_64+0x1a3/0x800 [ 784.015162] ? syscall_return_slowpath+0x5f0/0x5f0 [ 784.015202] ? prepare_exit_to_usermode+0x232/0x3b0 [ 784.026464] gfs2: error 10 reading superblock [ 784.027812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.027851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.027867] RIP: 0033:0x412041 [ 784.027884] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 784.096641] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 784.104373] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 784.111703] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 784.119007] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 784.126293] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 784.133611] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 [ 784.141197] protocol 88fb is buggy, dev hsr_slave_0 13:20:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2aa, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 784.146377] protocol 88fb is buggy, dev hsr_slave_1 13:20:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:20:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ab, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 784.168534] kernel msg: ebtables bug: please report to author: Wrong len argument [ 784.182131] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:20:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x20000458, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, 0x0) 13:20:59 executing program 2 (fault-call:1 fault-nth:78): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:20:59 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:20:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 784.345105] kernel msg: ebtables bug: please report to author: Wrong len argument [ 784.417172] attempt to access beyond end of device [ 784.422121] loop1: rw=4096, want=136, limit=16 [ 784.435971] FAULT_INJECTION: forcing a failure. [ 784.435971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:20:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 784.463447] protocol 88fb is buggy, dev hsr_slave_0 [ 784.468614] protocol 88fb is buggy, dev hsr_slave_1 [ 784.489501] CPU: 0 PID: 7633 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 784.496647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.506027] Call Trace: [ 784.506054] dump_stack+0x1db/0x2d0 [ 784.506083] ? dump_stack_print_info.cold+0x20/0x20 [ 784.506103] ? __kernel_text_address+0xd/0x40 [ 784.506125] ? unwind_get_return_address+0x61/0xa0 [ 784.506163] should_fail.cold+0xa/0x15 [ 784.508851] gfs2: error 10 reading superblock [ 784.512357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 784.512387] ? arch_local_save_flags+0x50/0x50 [ 784.512404] ? lock_release+0xc40/0xc40 [ 784.540299] ? __lock_is_held+0xb6/0x140 [ 784.540343] should_fail_alloc_page+0x50/0x60 [ 784.540361] __alloc_pages_nodemask+0x323/0xdc0 [ 784.540393] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 13:20:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:20:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ac, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 784.562157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.562196] ? __lock_is_held+0xb6/0x140 [ 784.562220] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 784.582341] alloc_pages_current+0x107/0x210 [ 784.586798] get_zeroed_page+0x14/0x50 [ 784.586816] mon_alloc_buff+0xc2/0x190 [ 784.586854] mon_bin_open+0x219/0x4a0 [ 784.586875] ? mon_bin_fetch+0x340/0x340 [ 784.602517] chrdev_open+0x270/0x7c0 [ 784.606255] ? cdev_put.part.0+0x50/0x50 [ 784.610335] ? errseq_sample+0xe6/0x140 13:20:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 784.610600] ebt_limit: overflow, try lower: 2147483647/65537 [ 784.614339] ? smack_inode_permission+0x2d4/0x3d0 [ 784.614372] ? security_file_open+0x8d/0x2a0 [ 784.614400] do_dentry_open+0x48a/0x1210 [ 784.614422] ? cdev_put.part.0+0x50/0x50 [ 784.614449] ? chown_common+0x740/0x740 [ 784.614468] ? security_inode_permission+0xd5/0x110 [ 784.614495] ? inode_permission+0xb4/0x570 [ 784.614538] vfs_open+0xa0/0xd0 [ 784.614560] path_openat+0x144f/0x5650 [ 784.614607] ? add_lock_to_list.isra.0+0x450/0x450 [ 784.614662] ? path_lookupat.isra.0+0xba0/0xba0 13:20:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 784.614683] ? do_dup2+0x580/0x580 [ 784.671345] ? kasan_check_read+0x11/0x20 [ 784.675521] ? do_raw_spin_unlock+0xa0/0x330 [ 784.679948] ? do_raw_spin_trylock+0x270/0x270 [ 784.684547] ? __phys_addr_symbol+0x30/0x70 [ 784.688925] do_filp_open+0x26f/0x370 [ 784.692761] ? may_open_dev+0x100/0x100 [ 784.696825] ? digsig_verify.cold+0x32/0x32 [ 784.701194] ? get_unused_fd_flags+0x122/0x1a0 [ 784.705803] ? __alloc_fd+0x700/0x700 [ 784.709638] ? getname_flags+0x277/0x5b0 [ 784.713739] do_sys_open+0x59a/0x7c0 [ 784.717485] ? filp_open+0x80/0x80 [ 784.721058] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.726450] ? trace_hardirqs_off_caller+0x300/0x300 [ 784.731602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 784.736398] __x64_sys_open+0x7e/0xc0 [ 784.740222] do_syscall_64+0x1a3/0x800 [ 784.744141] ? syscall_return_slowpath+0x5f0/0x5f0 [ 784.749109] ? prepare_exit_to_usermode+0x232/0x3b0 [ 784.754167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.759058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.764274] RIP: 0033:0x412041 [ 784.767492] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 784.786405] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 784.794125] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 784.801411] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 784.808708] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 784.815993] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 784.823279] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:21:00 executing program 2 (fault-call:1 fault-nth:79): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ad, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 784.955015] attempt to access beyond end of device [ 784.961862] ebt_limit: overflow, try lower: 2147483647/65537 [ 784.971287] loop1: rw=4096, want=136, limit=16 [ 784.986393] gfs2: error 10 reading superblock 13:21:00 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplps\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2300, 0x0, 0x0, 0x0, 0x0) 13:21:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 785.053455] FAULT_INJECTION: forcing a failure. [ 785.053455] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 785.130661] CPU: 0 PID: 7664 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 785.137815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.147194] Call Trace: [ 785.149807] dump_stack+0x1db/0x2d0 [ 785.153462] ? dump_stack_print_info.cold+0x20/0x20 [ 785.158515] should_fail.cold+0xa/0x15 [ 785.162432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 785.167580] ? arch_local_save_flags+0x50/0x50 [ 785.172181] ? lock_release+0xc40/0xc40 [ 785.176171] ? __lock_is_held+0xb6/0x140 [ 785.180268] should_fail_alloc_page+0x50/0x60 [ 785.184777] __alloc_pages_nodemask+0x323/0xdc0 [ 785.189485] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 785.194526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.200115] ? __lock_is_held+0xb6/0x140 [ 785.204231] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 785.209807] alloc_pages_current+0x107/0x210 [ 785.214244] get_zeroed_page+0x14/0x50 [ 785.218152] mon_alloc_buff+0xc2/0x190 [ 785.222063] mon_bin_open+0x219/0x4a0 [ 785.225902] ? mon_bin_fetch+0x340/0x340 [ 785.229993] chrdev_open+0x270/0x7c0 [ 785.233761] ? cdev_put.part.0+0x50/0x50 [ 785.237839] ? errseq_sample+0xe6/0x140 [ 785.241829] ? smack_inode_permission+0x2d4/0x3d0 [ 785.246737] ? security_file_open+0x8d/0x2a0 [ 785.251198] do_dentry_open+0x48a/0x1210 [ 785.255279] ? cdev_put.part.0+0x50/0x50 [ 785.259369] ? chown_common+0x740/0x740 [ 785.263361] ? security_inode_permission+0xd5/0x110 [ 785.268396] ? inode_permission+0xb4/0x570 [ 785.272660] vfs_open+0xa0/0xd0 [ 785.276395] path_openat+0x144f/0x5650 [ 785.280302] ? add_lock_to_list.isra.0+0x450/0x450 [ 785.285281] ? path_lookupat.isra.0+0xba0/0xba0 [ 785.289965] ? do_dup2+0x580/0x580 [ 785.293547] ? kasan_check_read+0x11/0x20 [ 785.297732] ? do_raw_spin_unlock+0xa0/0x330 [ 785.302155] ? do_raw_spin_trylock+0x270/0x270 [ 785.306760] ? __phys_addr_symbol+0x30/0x70 [ 785.311123] do_filp_open+0x26f/0x370 [ 785.314937] ? may_open_dev+0x100/0x100 [ 785.318998] ? digsig_verify.cold+0x32/0x32 [ 785.323340] ? get_unused_fd_flags+0x122/0x1a0 [ 785.327933] ? __alloc_fd+0x700/0x700 13:21:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ae, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 785.331801] ? getname_flags+0x277/0x5b0 [ 785.335938] do_sys_open+0x59a/0x7c0 [ 785.339705] ? filp_open+0x80/0x80 [ 785.343284] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.345698] ebt_limit: overflow, try lower: 2147483647/65537 [ 785.348664] ? trace_hardirqs_off_caller+0x300/0x300 [ 785.359605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 785.364389] __x64_sys_open+0x7e/0xc0 [ 785.368214] do_syscall_64+0x1a3/0x800 [ 785.372124] ? syscall_return_slowpath+0x5f0/0x5f0 [ 785.377065] ? prepare_exit_to_usermode+0x232/0x3b0 [ 785.382276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.387158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.393152] RIP: 0033:0x412041 [ 785.396354] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 785.415274] RSP: 002b:00007f531d55c7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 785.423006] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 13:21:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x29f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 785.430291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f531d55c850 [ 785.437573] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 785.444863] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f531d55d6d4 [ 785.452154] R13: 00000000004c6c03 R14: 00000000004dbfc8 R15: 0000000000000004 13:21:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2af, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 785.591075] attempt to access beyond end of device [ 785.596724] loop1: rw=4096, want=136, limit=17 [ 785.614279] gfs2: error 10 reading superblock 13:21:00 executing program 2 (fault-call:1 fault-nth:80): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 785.652794] ebt_limit: overflow, try lower: 2147483647/65537 13:21:00 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplss\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 785.720086] attempt to access beyond end of device [ 785.729314] loop1: rw=4096, want=136, limit=17 [ 785.754019] gfs2: error 10 reading superblock 13:21:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2803, 0x0, 0x0, 0x0, 0x0) 13:21:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 785.872441] ebt_limit: overflow, try lower: 2147483647/65537 13:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 785.962341] attempt to access beyond end of device 13:21:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:01 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplxs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 786.001896] loop1: rw=4096, want=136, limit=20 [ 786.014125] gfs2: error 10 reading superblock [ 786.041619] ebt_limit: overflow, try lower: 2147483647/65537 13:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='Kdev/usbmon#\x00', 0x0, 0x0) 13:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 786.073885] attempt to access beyond end of device [ 786.078999] loop1: rw=4096, want=136, limit=20 [ 786.096374] gfs2: error 10 reading superblock 13:21:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2e00, 0x0, 0x0, 0x0, 0x0) 13:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/.ev/usbmon#\x00', 0x0, 0x0) 13:21:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 786.240488] ebt_limit: overflow, try lower: 2147483647/65537 13:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 786.377721] ebt_limit: overflow, try lower: 2147483647/65537 13:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:01 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu\n\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 786.420753] attempt to access beyond end of device [ 786.435268] loop1: rw=4096, want=136, limit=23 [ 786.448945] gfs2: error 10 reading superblock 13:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='//ev/usbmon#\x00', 0x0, 0x0) [ 786.479829] ebt_limit: overflow, try lower: 2147483647/65537 13:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 786.533433] attempt to access beyond end of device [ 786.544171] loop1: rw=4096, want=136, limit=23 [ 786.557080] gfs2: error 10 reading superblock 13:21:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 786.582184] __nla_parse: 19 callbacks suppressed [ 786.582195] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 786.600493] ebt_limit: overflow, try lower: 2147483647/65537 13:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3402, 0x0, 0x0, 0x0, 0x0) 13:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/devKusbmon#\x00', 0x0, 0x0) 13:21:01 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu#\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 786.688101] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/.sbmon#\x00', 0x0, 0x0) 13:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 786.794927] attempt to access beyond end of device [ 786.799898] loop1: rw=4096, want=136, limit=26 [ 786.804821] gfs2: error 10 reading superblock [ 786.850971] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 786.871533] attempt to access beyond end of device [ 786.901250] loop1: rw=4096, want=136, limit=26 13:21:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev//sbmon#\x00', 0x0, 0x0) [ 786.929023] gfs2: error 10 reading superblock 13:21:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 13:21:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmonK\x00', 0x0, 0x0) 13:21:02 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu%\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 787.101715] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 787.124068] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 787.201319] attempt to access beyond end of device 13:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 787.231720] loop1: rw=4096, want=136, limit=31 13:21:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 787.262620] gfs2: error 10 reading superblock 13:21:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x02', 0x0, 0x0) [ 787.304556] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 787.334895] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 787.374677] attempt to access beyond end of device [ 787.379633] loop1: rw=4096, want=136, limit=31 13:21:02 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu*\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x04', 0x0, 0x0) [ 787.453898] gfs2: error 10 reading superblock 13:21:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 13:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 787.508560] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 787.611643] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 787.700064] attempt to access beyond end of device [ 787.711056] loop1: rw=4096, want=136, limit=32 [ 787.734661] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 787.740688] gfs2: error 10 reading superblock 13:21:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:02 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu+\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ba, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 787.852437] attempt to access beyond end of device [ 787.864221] loop1: rw=4096, want=136, limit=32 [ 787.869038] gfs2: error 10 reading superblock 13:21:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) 13:21:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:03 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu-\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2aa, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\xff', 0x0, 0x0) [ 788.160933] attempt to access beyond end of device [ 788.166730] loop1: rw=4096, want=136, limit=36 [ 788.171474] gfs2: error 10 reading superblock 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) 13:21:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 788.303410] net_ratelimit: 20 callbacks suppressed [ 788.303417] protocol 88fb is buggy, dev hsr_slave_0 [ 788.313443] protocol 88fb is buggy, dev hsr_slave_1 13:21:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ab, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:03 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\xeb', 0x0, 0x0) 13:21:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ac, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 788.495904] attempt to access beyond end of device [ 788.506654] loop1: rw=4096, want=136, limit=38 [ 788.517053] gfs2: error 10 reading superblock 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 788.608975] attempt to access beyond end of device [ 788.619729] loop1: rw=4096, want=136, limit=38 [ 788.623464] protocol 88fb is buggy, dev hsr_slave_0 [ 788.629426] protocol 88fb is buggy, dev hsr_slave_1 [ 788.631418] gfs2: error 10 reading superblock [ 788.634599] protocol 88fb is buggy, dev hsr_slave_0 [ 788.634669] protocol 88fb is buggy, dev hsr_slave_1 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) 13:21:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2be, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:03 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplu0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ad, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 788.894445] attempt to access beyond end of device [ 788.927041] loop1: rw=4096, want=136, limit=48 [ 788.932578] gfs2: error 10 reading superblock 13:21:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bf, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 789.000656] attempt to access beyond end of device [ 789.006867] loop1: rw=4096, want=136, limit=48 13:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ae, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 789.043535] gfs2: error 10 reading superblock 13:21:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6002, 0x0, 0x0, 0x0, 0x0) 13:21:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 789.226317] attempt to access beyond end of device [ 789.246187] loop1: rw=4096, want=136, limit=48 [ 789.263444] protocol 88fb is buggy, dev hsr_slave_0 [ 789.268624] protocol 88fb is buggy, dev hsr_slave_1 13:21:04 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluX\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 789.274691] gfs2: error 10 reading superblock 13:21:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2af, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 789.389144] attempt to access beyond end of device [ 789.408306] loop1: rw=4096, want=136, limit=48 13:21:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 789.433197] gfs2: error 10 reading superblock 13:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:04 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluc\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 789.583402] protocol 88fb is buggy, dev hsr_slave_0 [ 789.588500] protocol 88fb is buggy, dev hsr_slave_1 [ 789.622547] ebt_limit_mt_check: 22 callbacks suppressed 13:21:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 13:21:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x0) [ 789.622555] ebt_limit: overflow, try lower: 2147483647/65537 13:21:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 789.693484] attempt to access beyond end of device [ 789.698451] loop1: rw=4096, want=136, limit=52 [ 789.727559] gfs2: error 10 reading superblock 13:21:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 789.802048] attempt to access beyond end of device [ 789.807606] loop1: rw=4096, want=136, limit=52 [ 789.812256] gfs2: error 10 reading superblock 13:21:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) 13:21:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) [ 789.879088] ebt_limit: overflow, try lower: 2147483647/65537 13:21:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:05 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplud\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 789.983547] attempt to access beyond end of device 13:21:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000000, 0x0) 13:21:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 790.024277] ebt_limit: overflow, try lower: 2147483647/65537 [ 790.033578] loop1: rw=4096, want=136, limit=54 [ 790.050269] gfs2: error 10 reading superblock 13:21:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) [ 790.185452] ebt_limit: overflow, try lower: 2147483647/65537 13:21:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2000000, 0x0) 13:21:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:05 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplui\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 790.368872] attempt to access beyond end of device [ 790.398557] loop1: rw=4096, want=136, limit=58 13:21:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 790.428201] gfs2: error 10 reading superblock [ 790.428927] ebt_limit: overflow, try lower: 2147483647/65537 13:21:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4000000, 0x0) 13:21:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) 13:21:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 790.627483] ebt_limit: overflow, try lower: 2147483647/65537 13:21:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:05 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplul\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xebffffff, 0x0) [ 790.709445] attempt to access beyond end of device [ 790.726079] loop1: rw=4096, want=136, limit=61 [ 790.739101] gfs2: error 10 reading superblock [ 790.756414] ebt_limit: overflow, try lower: 2147483647/65537 13:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 790.832555] attempt to access beyond end of device [ 790.848484] loop1: rw=4096, want=136, limit=61 13:21:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 790.878223] gfs2: error 10 reading superblock [ 790.881464] ebt_limit: overflow, try lower: 2147483647/65537 13:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffeb, 0x0) 13:21:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x9003, 0x0, 0x0, 0x0, 0x0) 13:21:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 791.022448] ebt_limit: overflow, try lower: 2147483647/65537 13:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 791.132317] attempt to access beyond end of device 13:21:06 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluo\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1000000000000, 0x0) [ 791.153496] loop1: rw=4096, want=136, limit=72 [ 791.173037] gfs2: error 10 reading superblock [ 791.174615] ebt_limit: overflow, try lower: 2147483647/65537 13:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ca, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 791.246674] attempt to access beyond end of device [ 791.251638] loop1: rw=4096, want=136, limit=72 [ 791.251648] gfs2: error 10 reading superblock 13:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa000, 0x0, 0x0, 0x0, 0x0) 13:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000000000000, 0x0) [ 791.457672] attempt to access beyond end of device [ 791.462662] loop1: rw=4096, want=136, limit=80 13:21:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:06 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplup\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x200000000000000, 0x0) [ 791.512068] gfs2: error 10 reading superblock 13:21:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2b9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 791.597779] attempt to access beyond end of device [ 791.602809] loop1: rw=4096, want=136, limit=80 [ 791.618666] gfs2: error 10 reading superblock 13:21:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa601, 0x0, 0x0, 0x0, 0x0) 13:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400000000000000, 0x0) [ 791.672261] __nla_parse: 35 callbacks suppressed [ 791.672276] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 791.709451] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ba, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 791.788127] attempt to access beyond end of device 13:21:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:07 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfspluu\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 791.823452] loop1: rw=4096, want=136, limit=83 [ 791.828172] gfs2: error 10 reading superblock 13:21:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xebffffff00000000, 0x0) [ 791.911536] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 791.958005] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 792.007398] attempt to access beyond end of device [ 792.012525] loop1: rw=4096, want=136, limit=83 [ 792.043680] gfs2: error 10 reading superblock 13:21:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa800, 0x0, 0x0, 0x0, 0x0) 13:21:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ce, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 792.119721] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffff00000000, 0x0) 13:21:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 792.225536] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cf, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:07 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplux\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 792.304853] attempt to access beyond end of device [ 792.309867] loop1: rw=4096, want=136, limit=84 [ 792.365787] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 792.378354] gfs2: error 10 reading superblock 13:21:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2) [ 792.408471] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 792.512072] attempt to access beyond end of device [ 792.524283] loop1: rw=4096, want=136, limit=84 13:21:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 792.563709] gfs2: error 10 reading superblock [ 792.600923] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xba01, 0x0, 0x0, 0x0, 0x0) 13:21:07 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x02', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4) 13:21:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2be, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 792.697188] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1000000) [ 792.767718] attempt to access beyond end of device [ 792.772807] loop1: rw=4096, want=136, limit=93 13:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 792.814956] gfs2: error 10 reading superblock 13:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2bf, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:08 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 792.925659] attempt to access beyond end of device [ 792.930618] loop1: rw=4096, want=136, limit=93 13:21:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000000) 13:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 792.982522] gfs2: error 10 reading superblock 13:21:08 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xd403, 0x0, 0x0, 0x0, 0x0) 13:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4000000) 13:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 793.264728] attempt to access beyond end of device 13:21:08 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x04', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 793.288010] loop1: rw=4096, want=136, limit=106 [ 793.308175] gfs2: error 10 reading superblock 13:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xebffffff) [ 793.423431] net_ratelimit: 20 callbacks suppressed [ 793.423439] protocol 88fb is buggy, dev hsr_slave_0 [ 793.433518] protocol 88fb is buggy, dev hsr_slave_1 13:21:08 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xea03, 0x0, 0x0, 0x0, 0x0) 13:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xffffffeb) 13:21:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 793.596105] attempt to access beyond end of device [ 793.601076] loop1: rw=4096, want=136, limit=117 [ 793.610805] gfs2: error 10 reading superblock 13:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:08 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x05', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 793.682154] attempt to access beyond end of device [ 793.702242] loop1: rw=4096, want=136, limit=117 13:21:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1000000000000) [ 793.739760] gfs2: error 10 reading superblock [ 793.744399] protocol 88fb is buggy, dev hsr_slave_0 [ 793.744455] protocol 88fb is buggy, dev hsr_slave_1 [ 793.744545] protocol 88fb is buggy, dev hsr_slave_0 [ 793.744609] protocol 88fb is buggy, dev hsr_slave_1 13:21:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:09 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) 13:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x100000000000000) 13:21:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 794.002071] attempt to access beyond end of device [ 794.020581] loop1: rw=4096, want=136, limit=118 [ 794.059432] gfs2: error 10 reading superblock 13:21:09 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x06', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 794.122806] attempt to access beyond end of device [ 794.131992] loop1: rw=4096, want=136, limit=118 [ 794.138000] gfs2: error 10 reading superblock 13:21:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x200000000000000) 13:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:09 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf003, 0x0, 0x0, 0x0, 0x0) 13:21:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400000000000000) [ 794.444858] attempt to access beyond end of device [ 794.451110] loop1: rw=4096, want=136, limit=120 13:21:09 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\a', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 794.493039] gfs2: error 10 reading superblock [ 794.553404] protocol 88fb is buggy, dev hsr_slave_0 [ 794.558567] protocol 88fb is buggy, dev hsr_slave_1 [ 794.584973] attempt to access beyond end of device 13:21:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 794.602067] loop1: rw=4096, want=136, limit=120 [ 794.623623] gfs2: error 10 reading superblock 13:21:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xebffffff00000000) 13:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2da, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:09 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf401, 0x0, 0x0, 0x0, 0x0) [ 794.726483] ebt_limit_mt_check: 27 callbacks suppressed [ 794.726504] ebt_limit: overflow, try lower: 2147483647/65537 13:21:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2db, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0xffffffff00000000) 13:21:10 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\t', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 794.863405] protocol 88fb is buggy, dev hsr_slave_0 [ 794.868517] protocol 88fb is buggy, dev hsr_slave_1 [ 794.902739] attempt to access beyond end of device 13:21:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 794.934253] loop1: rw=4096, want=136, limit=122 [ 794.949620] gfs2: error 10 reading superblock [ 794.949640] ebt_limit: overflow, try lower: 2147483647/65537 13:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c6, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x81}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000680)={0x1}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x8001, 0x7, &(0x7f0000000580)=[{&(0x7f00000000c0)="294426ffe5f7877212e22566a2e42078aa1b4c495714c0023e8a02fd4ca3ec34ce15d6b7eca850dd070295f520aa444653", 0x31, 0x1}, {&(0x7f0000000200)="c926457ce82cab50fe11d7028486010e813009f7abea56e3aa94aadbcb7035f1bee045f37db036b8157a19dc689bc38c8a2485a8f1825fb79aac408a6485f3ce1eea74d338583f8c1cb20af68c21feb793e4ee529c90e42c93610d95d28241102da1eb4daf4cfb451634ccfbee195bf1f5367920b4ca78a34c3b53cc67af072259989a5100e87cb6c24a3f33866be020f514f7b05eed198f3c89986f9dd38a5e24c345afc6c9cdc3793b467359b6267135603f9fda28b7235fde7304df74f17454f398d67dc38aac96579f767a0ba984", 0xd0, 0x8}, {&(0x7f0000000100)="e70a2bd0058b12d0fc872c3adde29d5f58920e1a2caf69b7be7cf80d24c1963fa1f143848aaeb256", 0x28, 0xfffffffffffff609}, {&(0x7f0000000300)="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", 0xfb}, {&(0x7f0000000140)="75e48a89efdf2b5c045b21cf452d519ad0afa865a23d19395d5584b6690442f57ff73759f0fbb1b2574dc49484bf218c061500", 0x33, 0x4}, {&(0x7f0000000400)="8b4683c0578dfa3dca51ea63938bbafe0ba969ee1cb0cb591314fe779cb9357894abfb867d7485086503abe2e2ec91418215410b537cf1921f119eec60e24deb30b411342eb85c413e638d63a80e77826bcc237b99f327d616d33b32638741f7ad7c18552ba494e5c860399032f1814e11faf7d431f7a4a405323a6eaa3e9412ccbcebabcfefe61a03ec843e87020ee80c633c6282516c35", 0x98, 0xc15}, {&(0x7f00000004c0)="421520bb2d0c8a601a42ca9886f56e61c15dc0ef297e853ab26093b24908ab05aa60f1427c1e421500d46810360af7b79420061ea86659de7c88b5a9208e07b826e5a4cca67a336e63fad11864853d8fe13909cd074ff3bf852bd8944fb7a556a39eecd1f5bed37c08e96f4f5c4a397d8a084b0540506c1fcbfbd64e656e14b7a4fc41800461f0f47c61a2c8fac5e2b3f669", 0x92, 0x2}], 0x800000, &(0x7f0000000640)={[{@discard_size={'discard', 0x3d, 0x5}}], [{@hash='hash'}]}) 13:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2dc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 795.068288] attempt to access beyond end of device [ 795.077381] loop1: rw=4096, want=136, limit=122 [ 795.096914] gfs2: error 10 reading superblock [ 795.132280] ebt_limit: overflow, try lower: 2147483647/65537 13:21:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2c9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:10 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf803, 0x0, 0x0, 0x0, 0x0) 13:21:10 executing program 2: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x800) pipe2(&(0x7f0000000280), 0x800) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x8e4}, &(0x7f0000000300)=0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x80001, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r1, &(0x7f0000000380)=0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x2c, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x1f, @loopback, 0x1}, @in={0x2, 0x4e24, @multicast1}]}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:10 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\n', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2dd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 795.344138] ebt_limit: overflow, try lower: 2147483647/65537 13:21:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ca, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 795.418309] attempt to access beyond end of device 13:21:10 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x42) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e20, @loopback}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e21, 0x4dc, @ipv4={[], [], @remote}, 0x4}}, [0x199f, 0x9, 0xfffffffffffffffd, 0x3, 0x0, 0x1d60, 0x8, 0x6, 0x7, 0x2, 0x101, 0x40, 0x0, 0x3]}, &(0x7f0000000200)=0x100) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000240)) [ 795.463642] loop1: rw=4096, want=136, limit=124 [ 795.475354] gfs2: error 10 reading superblock 13:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2de, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 795.519467] ebt_limit: overflow, try lower: 2147483647/65537 13:21:10 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\v', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 795.577865] attempt to access beyond end of device [ 795.594047] loop1: rw=4096, want=136, limit=124 13:21:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8000, 0x10000) [ 795.620888] gfs2: error 10 reading superblock [ 795.628630] ebt_limit: overflow, try lower: 2147483647/65537 13:21:10 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfa03, 0x0, 0x0, 0x0, 0x0) 13:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2df, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 795.812781] ebt_limit: overflow, try lower: 2147483647/65537 13:21:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f0000000080)=""/3, 0x3}, {&(0x7f0000000300)=""/94, 0x5e}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x800) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x100000001, 0x50000) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000001380), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 795.870034] attempt to access beyond end of device 13:21:11 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\f', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 795.900427] loop1: rw=4096, want=136, limit=125 [ 795.907653] gfs2: error 10 reading superblock 13:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x2, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 795.965484] ebt_limit: overflow, try lower: 2147483647/65537 [ 795.972777] attempt to access beyond end of device [ 795.988171] loop1: rw=4096, want=136, limit=125 [ 795.993014] gfs2: error 10 reading superblock 13:21:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:11 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x20000, 0x0, 0x0, 0x0, 0x0) 13:21:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x7fffffff) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000100)) [ 796.101510] ebt_limit: overflow, try lower: 2147483647/65537 13:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x3, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ce, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 796.225910] gfs2: not a GFS2 filesystem [ 796.240051] ebt_limit: overflow, try lower: 2147483647/65537 13:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2cf, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:11 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x0e', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:11 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, 0x0) 13:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x5, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 796.498191] gfs2: not a GFS2 filesystem [ 796.627528] gfs2: not a GFS2 filesystem 13:21:12 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x4004) 13:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:12 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x10', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe0000, 0x0, 0x0, 0x0, 0x0) [ 797.136495] __nla_parse: 38 callbacks suppressed [ 797.136504] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 797.160733] gfs2: not a GFS2 filesystem [ 797.183183] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x401, 0x3ff}) [ 797.304872] gfs2: not a GFS2 filesystem 13:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0xa, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 797.365420] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:12 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplusH', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x100000, 0x0, 0x0, 0x0, 0x0) 13:21:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 797.477486] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 797.533177] gfs2: not a GFS2 filesystem 13:21:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x48, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 797.618657] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x6, 0x105, 0x5, 0x3, 0x1, 0xfff}) [ 797.665469] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 797.675997] gfs2: not a GFS2 filesystem 13:21:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4c, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, 0x0) 13:21:13 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplusL', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000040)="b408309ce766dec407e99381f03219e15de4dbb2ba7b4e7722536fec65ad5684ca7ad921d812e6bbc7cc46a1a0a6c8f3cf68ef8ee3c1e55af84d0be1a4c921b2a589425dee9016bff984a05b650a59a49319f738849f037bb665327ab4572e9dfb4f19e3e1567dd1a9e8776c662d7395d74b3ec19fca598eefc21e6a729aaa627740b1d7cbcba3") [ 797.853699] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 797.878210] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x60, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 797.982938] gfs2: not a GFS2 filesystem 13:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3f, 0x8080) 13:21:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x68, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 798.083898] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) 13:21:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 798.144910] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:13 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus`', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:13 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40000) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1900, 0x0, 0x0, 0x100000001, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0x8, &(0x7f00000000c0)=0x1) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000200)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6c, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 798.364396] gfs2: not a GFS2 filesystem 13:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ea, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 798.463084] gfs2: not a GFS2 filesystem 13:21:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101001, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x9a0000, 0xd8d, 0x7, [], &(0x7f0000000080)={0x990969, 0x7f, [], @ptr=0xd63}}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x74, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:13 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplush', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 13:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2eb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7a, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:13 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 13:21:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2d9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 798.703439] net_ratelimit: 20 callbacks suppressed [ 798.703447] protocol 88fb is buggy, dev hsr_slave_0 [ 798.713514] protocol 88fb is buggy, dev hsr_slave_1 [ 798.733250] gfs2: not a GFS2 filesystem 13:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x300, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 798.798626] gfs2: not a GFS2 filesystem 13:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ec, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) 13:21:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) eventfd2(0x7e, 0x1) 13:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x500, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2da, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 799.023391] protocol 88fb is buggy, dev hsr_slave_0 [ 799.028496] protocol 88fb is buggy, dev hsr_slave_1 [ 799.033700] protocol 88fb is buggy, dev hsr_slave_0 [ 799.038783] protocol 88fb is buggy, dev hsr_slave_1 13:21:14 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplusl', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ed, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 799.065128] gfs2: not a GFS2 filesystem 13:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x600, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 799.141677] gfs2: not a GFS2 filesystem 13:21:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x200, 0x4000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000280)=0x49) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x0, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x2, 0x185, 0x5}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x15}, 0x20000000) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000240)) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0xfffffffffffffd5f, r1, 0x200, 0x70bd27, 0x40, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xd187}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x700, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2db, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 13:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ee, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0xa00, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 799.357361] gfs2: not a GFS2 filesystem 13:21:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x12000) 13:21:14 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplust', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2dc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 799.475208] gfs2: not a GFS2 filesystem 13:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x2000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ef, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 13:21:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xfffffffffffffc01, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x8000) sendfile(r0, r2, &(0x7f0000000000)=0x27, 0x3) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0x3) 13:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x3f00, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2dd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 799.663433] protocol 88fb is buggy, dev hsr_slave_0 [ 799.668622] protocol 88fb is buggy, dev hsr_slave_1 [ 799.703453] gfs2: not a GFS2 filesystem 13:21:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 799.779992] ebt_limit_mt_check: 18 callbacks suppressed [ 799.780002] ebt_limit: overflow, try lower: 2147483647/65537 [ 799.821502] ebt_limit: overflow, try lower: 2147483647/65537 13:21:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:15 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplusz', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 799.863846] gfs2: not a GFS2 filesystem 13:21:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) 13:21:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2de, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 799.983413] protocol 88fb is buggy, dev hsr_slave_0 [ 799.988581] protocol 88fb is buggy, dev hsr_slave_1 13:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 800.033242] ebt_limit: overflow, try lower: 2147483647/65537 13:21:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) shutdown(r0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x8, 0xaf1, 0x5, 0x8, 0x0, 0x4, 0x10000, 0x8, 0x3, 0x9, 0x2, 0x2, 0x3, 0x45f2, 0x1ff, 0x4, 0x4, 0x7, 0x7, 0x3, 0x4, 0x4, 0x1, 0x5, 0x3ff, 0x5c5, 0x3, 0x1, 0x7, 0x1, 0x7, 0x3f, 0x1, 0x9cc6, 0x2, 0x1ff, 0x0, 0x4e, 0x5, @perf_config_ext={0xfffffffffffffff7, 0x7ff}, 0x4010, 0xfffffffffffffffd, 0x7bcf, 0x3, 0x2, 0x2, 0x85d}, r1, 0x6, 0xffffffffffffffff, 0x1) [ 800.091330] gfs2: not a GFS2 filesystem 13:21:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4800, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2df, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 800.200299] ebt_limit: overflow, try lower: 2147483647/65537 13:21:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4c00, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:15 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 800.266075] gfs2: not a GFS2 filesystem 13:21:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x2, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) 13:21:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8001, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0x0, 0x2, {0xffffffffffffffff}}, 0x18) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 800.442529] ebt_limit: overflow, try lower: 2147483647/65537 [ 800.463761] hfsplus: gid requires an argument [ 800.480002] gfs2: not a GFS2 filesystem [ 800.485416] hfsplus: unable to parse mount options 13:21:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 800.565803] gfs2: not a GFS2 filesystem [ 800.622423] ebt_limit: overflow, try lower: 2147483647/65537 13:21:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6800, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, 0x0) 13:21:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000140)=0x3) setsockopt(r0, 0x9, 0x200, &(0x7f0000000200)="162851d1ff873647d0c9267a515366342e85b6519ae4eed61a6330ef803fe8477a81143e811c5845b4b89533518e67d35d0520440c8ee070a84494bde63f673446728fe24c9bb97aefa1617a7cbf53ba21bd30ff74819788fc2833e4127b6cf9c89a07a4041487210efd58313bdd878c05d8683e3c343a96c39b2754e1788078de75f6b1f3ca878e408bcbe9b0122cb31db580f749f44aae12e5f7a12db5d694fb318e4f", 0xa4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000100)=0x18) [ 800.663749] hfsplus: gid requires an argument [ 800.668294] hfsplus: unable to parse mount options 13:21:15 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 800.796891] ebt_limit: overflow, try lower: 2147483647/65537 [ 800.821084] gfs2: not a GFS2 filesystem 13:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6c00, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/arp\x00') ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f00000000c0)={0x176, "e724b5f39c927b8c6023a841eade665c03ef5108f444f873e99edbbe8f622745", 0x3, 0x1}) r2 = dup3(r0, r0, 0x80000) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000040)={0x71, 0xfffffffffffffffd, 0x6, 0x5, 0x2040000000000000}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) fcntl$getown(r2, 0x9) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 800.924968] hfsplus: gid requires an argument [ 800.930522] gfs2: not a GFS2 filesystem [ 800.945541] hfsplus: unable to parse mount options 13:21:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) 13:21:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 800.986629] ebt_limit: overflow, try lower: 2147483647/65537 13:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7400, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 801.069642] hfsplus: gid requires an argument [ 801.096103] hfsplus: unable to parse mount options [ 801.101918] gfs2: not a GFS2 filesystem 13:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:16 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 801.156121] ebt_limit: overflow, try lower: 2147483647/65537 [ 801.180886] ebt_limit: overflow, try lower: 2147483647/65537 13:21:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000140), &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x4000, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '/dev/usbmon#\x00'}}, {@version_u='version=9p2000.u'}], [{@obj_type={'obj_type', 0x3d, 'proc+vmnet0'}}, {@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, 'vmnet1'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/usbmon#\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@appraise='appraise'}, {@fowner_gt={'fowner>', r5}}]}}) [ 801.205919] gfs2: not a GFS2 filesystem 13:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7a00, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, 0x0) [ 801.349321] hfsplus: gid requires an argument [ 801.370997] hfsplus: unable to parse mount options 13:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x1000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0xd4, 0xe9b}, 0x1, 0x5, 0xff, {0x9, 0xf18}, 0x8, 0x3ff}) fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x2) 13:21:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 801.451343] gfs2: not a GFS2 filesystem [ 801.456413] hfsplus: gid requires an argument [ 801.475494] hfsplus: unable to parse mount options 13:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x2000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:16 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:16 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000080)=0x400005, 0x16a) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f00000000c0)={0x5ddc, 0x9, "394985826a9f73f12bf369a828e72e149d36993ee4a190c61b9add8ec3137ada", 0x1, 0x6, 0x1, 0x2, 0x1}) 13:21:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, 0x0) 13:21:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x3000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x15d) write$capi20_data(r0, &(0x7f0000000100)={{0x10, 0xeeb, 0xff, 0x83, 0x5, 0xffff}, 0xf, "4eb571f6d969bd33ba2a19ee5984ae"}, 0x21) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 801.751015] hfsplus: gid requires an argument [ 801.761678] hfsplus: unable to parse mount options 13:21:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fa, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x5000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 801.842048] gfs2: not a GFS2 filesystem [ 801.848724] hfsplus: gid requires an argument [ 801.864354] hfsplus: unable to parse mount options 13:21:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, 0x0) 13:21:17 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 802.170415] hfsplus: gid requires an argument [ 802.178970] gfs2: not a GFS2 filesystem 13:21:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'team0\x00', 0x2382}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x5}, 0xf) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x6) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000008, r2) [ 802.217836] hfsplus: unable to parse mount options [ 802.249432] __nla_parse: 37 callbacks suppressed [ 802.249443] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 802.284721] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2e9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 802.335737] hfsplus: gid requires an argument [ 802.346959] hfsplus: unable to parse mount options 13:21:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 13:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:17 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socket$inet(0x2, 0x80007, 0xff) [ 802.442208] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 802.473894] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7fffffe, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ea, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 802.523612] gfs2: not a GFS2 filesystem 13:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 802.621264] hfsplus: gid requires an argument [ 802.626856] gfs2: not a GFS2 filesystem [ 802.641311] hfsplus: unable to parse mount options 13:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0xa000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x10020000, 0x0, 0x0, 0x0, 0x0) [ 802.677589] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 802.740943] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 802.764764] hfsplus: gid requires an argument 13:21:17 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x10000) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000140)={0x80, 0x7, 0xff, 0x20, &(0x7f0000000080)=""/32, 0x4e, &(0x7f00000000c0)=""/78, 0x91, &(0x7f0000000200)=""/145}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 802.793573] hfsplus: unable to parse mount options 13:21:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2eb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:18 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x20000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 802.927536] gfs2: not a GFS2 filesystem 13:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ff, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 802.998779] gfs2: not a GFS2 filesystem 13:21:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x800000000000) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) [ 803.064674] hfsplus: gid requires an argument [ 803.084141] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:18 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x14010000, 0x0, 0x0, 0x0, 0x0) 13:21:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 803.113102] hfsplus: unable to parse mount options [ 803.137487] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ec, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x396c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000001e40)={&(0x7f0000001900)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001980)=""/161, 0xa1}, {&(0x7f0000001a40)=""/1, 0x1}, {&(0x7f0000001a80)=""/85, 0x55}, {&(0x7f0000001b00)=""/241, 0xf1}, {&(0x7f0000001c00)=""/1, 0x1}, {&(0x7f0000001c40)=""/92, 0x5c}, {&(0x7f0000001cc0)=""/166, 0xa6}], 0x7, &(0x7f0000001e00)=""/20, 0x14}, 0x0) sendmmsg(r0, &(0x7f0000007300)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)="7b366426c6a5e0550afd99d45ebd073ff52295acdfb5ee7447c7dcdb6d38715dc929c569edafd7f75ecbf35530369da0d7aea2fcc1f834fd0007f249d584dda35a1c485e8646105f3294ac13cec41ce2e59d108a3f84c5ece72534890a3e3fb1c50fc2ea808e47e6812de7b5bb51e9bbdd1043c1", 0x74}, {&(0x7f00000000c0)="9b604b479d277c98984fb4a8e18ba991307c8232bc06e6f3604cbbf0bb3e3e15a7a0b2cf57314e1e36284acab9d20f37", 0x30}, {&(0x7f0000000100)="b0eeade9ef5e54235e976e1e33830965c4a43794efc36aacf27e82dfa2f95913b178546922bddcdeb491480b1af90fcc6d00060ed9cd8369a83aa7bbdc3cc44ab438b2f80d6a32768e70fb8b9119cf6e0d634b5069fd7af897776ae24926bc3b7e284086170183c9ecd51c", 0x6b}, {&(0x7f0000000200)="89c428b2c2b841b633adbd5aee829aee6dda65d46e79eaa74f62b863e5f6718d4e0c5221799d8f7b8c2bd9ae843d2ab4cb1cab19a0d9bd3895e5fb354c52e979bdfda4d653472bf8fb4f445fc7c49dd6e117a7d4c5be35589d986aeef9f116c552dd05d844ae552a6b34c0bd94b4fb2114a3e9598d375b8d8399c6f2e13d23be552ddbaa0bcd007ffdc2ada48ba82251ead72cffa3ad336f5e80e631a7f4", 0x9e}, {&(0x7f00000002c0)="4b8f02850a79446d3b3793746cf9701bdec30696b76fe036c0070fa4fce5f02f96e614aabb8913516de3a9216d412d5575d2c8b5940e3c69299e80d75d96a65debdc024a83891c4eeff5eea2398442931db15bb629ab57a1587680cbe40c2e1678853aaad85cc8908eb0d8c30c7ecfa5c864c9872681e0d758611715d34a674b6e3608c461cc78615485d26dc9f62953bf2a1cc35d40e6cc1d2341c7a08530721e22dc1ef74d396efa0bc2db2ca8f37757d102935b86201a90fc2314b539e59dbef2150c361bfe816301", 0xca}, {&(0x7f00000003c0)="e874904532360ee24e2cd90e3082b5c9b2fc2907edbedd6adab5aacbf74c38f29d56530241aa6e27afe51d0d4ded29509409771e61373ee25ff87e216b66bfefdbf9a4b2004a546fc65754b1fce2b7a5085abb627beb822f50be94dea292b8362c61736253ecfb9e1cd5ce422822e73714e2df25cd0316d4cb368733e370900e5155120eda89ec39e2de3fac87640cd5bd8ea758c2e9f0a5ed160494d7f95f6dde6542c7f0daa4cd9639a7451ff8e3dd058d9c13c86bd860f4054a7f9208d3f10f0eb2ffa6e901d1ccfeeff0c5805eff", 0xd0}, {&(0x7f00000004c0)="6123756c2c5bbbde64958e2411c7416bf047626336f8d1035acf2862eaca31b89f0a94bbd411baced8ebeaa6aea4a6c00292618ff7de6b6039c6e64d0f5e3781e367acd49e5eda58b2bcb5bfe07d7d19d4208d989ba36f9ba501449e226b5b53f7d894f19a1fab35616c15b1c72676211ef326f5733bfc91e80f6457d6b42dd7aa8a45f9a999328b156e9197b2c71dfda5bc0922debcd4", 0x97}], 0x7, &(0x7f0000000600)=[{0x110, 0x10e, 0x0, "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"}], 0x110}, 0x10000}, {{&(0x7f0000001e80)=@xdp={0x2c, 0x7, r1, 0x3}, 0x80, &(0x7f0000002340)=[{&(0x7f0000001f00)="53cb1c249012599179b8beaa7bd518ee2a4f692ec87549ea3e7871e9d0a632ad808c2e8890eb4e45cf519682a5aacbcfbfd1f8a6cd7fab16713a6f5683c38742f1ae42ff69a538c2f1cd00c8efbce00c288f595e3085676a34940ad1131a216b5665cf648f8d0a18961d867cdfe49d13757db7d76c39cecac73b78ce83bcb9b54001338912271d2b2f6e916cc6c775c3f63b7cd2f626798dbd9377cd28dab6b53886222e26fd715704d7c7c7c54579fc35166c2e0ca194462ce3c9863f5d66eb16a615179d94fb1bd72ad5351e114139d58e0dd4ab5b862bfa2f6dd9d558e7e60d698d47e870a7f1a968f65da7f7f178bf44", 0xf2}, {&(0x7f0000002000)="d3fe6f38a6a536217eaeced458cd9d2b128277e0017ac2f7a540223c97f5d391f59dbe99ffd45f4c8b35ad54a8a083a508711bf08451de542efed30c06af05943467448a2d6092aa814661fe9fb99e31bcc0123c7c9572c45f4287288e0c71e86a109e2c893bfa58f2ac4d9717aa47440eed214d760b", 0x76}, {&(0x7f0000002080)="f4c184da62e3ba74ee7e49d6fb406d0bd6d9d37406178a9fcd03ac81ab72ebec4e73f3f5ea46b90228db1d455ea763d11f371e667c3cb8035b29d2f6456e792804c1c9bdb11aaa1a81c89c14c664027585fee20a28d5d5747e048c43c67bab39c95664d1e151492315c60684ee0a4852109e4a474b6c66eb09bb6b4575e0e2b6f1102de3dccd038094013b58581b490b91657453ab65c61edd75dd6bee2a071afa3437b694f583942286d6f40098de3b0794337f5a41f5651a18fe9b29a20139ef0508107ba29affff12f550858cc7a9", 0xd0}, {&(0x7f0000002180)="2a21b17e3390196730ffd1e2bf5a8114024ee46dde92388d446716423651955345b29d8441fb8957ea33b6d070e1d79d014572bc8df92b9abf60db944c7d744db263f3ce08b9bdd0df58a0eb38db95aacc1ad49636b63e3d1bd82f35722e402236f553ecf1c51aa81d0e4e6343dd48c778c4acc11f6e90bddcc758899b935b26992240a8b53318e62390a648a089fa7c99e1950fa33f46400511493864ef0a57975bf478664e453598f1b4d2bd1607dac6194293e079c64ee3129ebb996b29964f1203ca", 0xc4}, {&(0x7f0000002280)="d903201d61c208c77ce082b8075a640958a6f22e886d0611db4dce328a7faffab1ac291fa92074dd234053059c7b9014476c74fefbe81ffd6e9557631241f0a97aebae2c84b921d0cb8aa197847da2c9c00c672050908e2ed9e19f79f6ef56723a07075ebb83598e2c4919449221ff95882b4a8041061e35803d85eb7b2da9eaafeb9eb40a931f8a7bfdb8f727354d43eb30720322329ad9", 0x98}], 0x5, &(0x7f00000023c0)=[{0x1010, 0x108, 0x3f, "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"}, {0xd0, 0x18d, 0x7, "92f1812b2ea0d8eecb961579b6a42bf525c6ea68df132143da685f32abdf09d433a36215094c83628b280ec2ab92b11cfda05c9c420080088bcd5cf1a465ce3b6dc1a6e28770b7998e6e7808e64630ede7e5c756c5354d7317d12a785896cb2ece3b159566bfbafe387c4e7fd60377a9f6be639aae0c1853b662a9af3339b7dd6c54315b1bbfbcdee2c6b5f4692b7c5ebcfb5fc7737f02d58c42cd7508957b98523251bc8e46649ee52b04acf118b236535bd12a921cd47df1ac7af77231"}, {0xb0, 0x118, 0x101, "305ac0891f1a5525be4334d66641f5132ef24949701d791b073f8b01a3970dae3084ab4583e2fdf1948da5fdf53f4b7244b1ef58aea3f095a9a49cf5dedab04426a5cc96882e7adafb128f405d51c89874d4479cb5a2b248a3308a3dba541e106085f8fb5872e7720196e9e2e0893971c094bb0af5813e1edb1a3faf70d272fe99b15a016462ff3d8fb5ab9337fdc1617374b9ee5424fc2ef86d6f93cc"}, {0x1010, 0x100, 0x6, "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"}, {0xc0, 0x119, 0x2, "27922923b3a6f1e87f8e9e058df28c71294914900bb7c6300bd3130ecce4acd552dd21491599c0e29299c6faea351e21205a5fde894b75c2a15551edf322dc5af09466d997496354770e99d090b129ae0235fa6976ef671c6e8a002b9101bb94a2b973e40abbb8f07ec74d8636b9b3752092d07bb13bb45bb60af87a0f826c53ccb1e80fc04c3ef717701dbc64557b885530eacaf9cac6088f0d595afcc94bb3b29c3050e3dcab7d1f803ff40804"}, {0x28, 0x114, 0x9, "77e218d7c0e6f523802fa11229f99bda3c8b"}], 0x2288}, 0x4984b3a}, {{&(0x7f0000004680)=@isdn={0x22, 0x20, 0x1, 0x0, 0x6}, 0x80, &(0x7f0000004840)=[{&(0x7f0000004700)="78420bed8f43c323b5a8b28d826f733949bbfb09efa2f60916e5d6061617facdaf42fb43e11a5e21de9493c28dcea397f06a763e968824369050d0001907b1e096d31c47654d299d5341ffc1da8ae04573e3a764468e963dd3bbdd709cf48d81d51c6b6b2e85fbc52c4e089283178646a8eabfbae520b400bcc7b23788ea7fb5f6465725f9bd69e3e59bbf3812e6cc1af47df0635dc42ebd3281cffd1b170797157a2fef2450f308aa7d12e8a5f0bff7d25bf3c491813a7686002e2d8b15410ff3af17e76a09f0ec5ce10f43565afdde726833f8", 0xd4}, {&(0x7f0000004800)}], 0x2, &(0x7f0000004880)=[{0x58, 0x100, 0x9, "b9338f43fe0f32d9641222c597b27b23d41b309c3066f5f8469a433f7229d24efceadda4f3e3b95fa5001d825634dd1430a9bdc25ade0f3de7fcfa45c3ffcadc7eb8c99e3d"}, {0x90, 0x103, 0x7fffffff, "93aee9a00d354afab3e52dd2925342e4fd7b0240cdd80c6e3349e5e1be9bab3abb2a978d2ea1967fcca3c7b400f1c4c13211a9281f9c7e433b7c47420be88443fe955139a1b614cd973088a578d2191308cf762c6cc7ecd2864a96b66461cb98354643d302a3c72d58ff0dd10239169d4bc33b4d7a33f42325"}, {0x68, 0x109, 0x2, "fde83d6bfef4218176807021805e29bffbf729dea26fb82eb6a643cb8852d05a4f14aba44c5fd690dd91b792e889c5c99c3fa335b7c78ea5e2ae278cb60cf6a1434f8f3d064a4a81ce861b123ad053bee62a67f66e85"}, {0x100, 0x0, 0x5, "2d3ac0809e60d8dfe5f52686fc4c813b6231ba036c56f256bebde03be67ff97d90e1c339177e63fdb6d2a669a15d0c38c74ad109a1b6d6be12d0aa7a0f6a7358d4bcaa0c04c97dfc9fb8b95a01a798cafeedbb43d65323023c1700fdbcedcdb1d408b33e04738459527615f24ee3c82419f47318364ad65b65d41f96e34857a991f3adbcbd98edec8efc774d387e13fd8270e02744a38908e2df5245e5e07ae4da5a7820351065bf1adc8ae047e0db984951c2148b7490773808bc295be03b444a74fcb4f090daf7a2ad6c9d8922ae4b8ec332f947648572bd5df78534834ce789f85a712405b5e2a6ac"}, {0x110, 0x117, 0x7fff, "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"}, {0xc8, 0x107, 0x3f, "e7d9d630be5dcd223b53d7dccac7c324cfbc0ba61f3e07c9cc69c084350ccb9a668279f40e3f086de8cdda80a83ca38a6af98722da705c631dd9b63b6444a6977c94b418f00e93ca71a684a19d65415c01b1d2479498f6f94dee9d43557340a80b3bb9523a7341c4b5f14469f9dddcbec07fc215fc673eac5c747a5b9d41be3893a54b013ec1e0c2a35f38ef108b33b175de4b201a8f56dec54f46286bef8acbbdba913c382b515374d4e1c6ac43d0949c"}, {0xe8, 0x116, 0x9, "9f581d4f37562caff7645d9b29c300b471951f7463d79a1879fe67329e5c8dafa62105a64a4b7d1fd9646f880b784a7d9f64d1d4441116b6a8699bf7a79eca0745e275901ece0fa5ca4cf0445d2c8979aa7823e40dc7141a7a32598112cc2dcf7f783360adf16a5735e371011130ee3342920451cfeace607e06997a92ed83bc2655b6672c269eb76970bc56706dc8a676a50bff0f829316ede96b4432964395bd7f697516d776c13bb2bf135afb93cc7e3947da983a805c1b042657d7a6f49f5e5cbb1f39ecb8ef22d04710194e57f07b19"}], 0x510}, 0xff}, {{&(0x7f0000004dc0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000005f00)=[{&(0x7f0000004e40)="3fe4a328bfc4428dff7803d392d4c4f973eba5880f01c22f1ed05c349d5dd25ad93758db7091ea6e49648e00cca3beb06605fe5ac1bb3da8fc934c2b1d6ec44bbfedfbca27c48016dc199fbc85bbb4e902f046d0e8764d364415dfeb24a244abe3b19520eaab0fa2cbe7f4a9ac808f4d3f6a6eb7384a7988f9b1277cb01fd5f0131d21d5e3525ed88a01cace485fe696a947c2", 0x93}, {&(0x7f0000004f00)="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", 0x1000}], 0x2, &(0x7f0000005f40)=[{0xc8, 0x88, 0x6, "59e0112d61d7d8ccf9ebafd0adfc33cab0e80b805e07237b1de964c1847b8bbae94a213ab63041d7c24da25a82429ce857bf98e18c968c4c918343d500a1c0afff69272913546fd288abd762df97843cc0275223d8fa2b93806e2b7bf982bb228ee436ba8d1a6dd10eb5731522866ac33a54aacabae0cc926dbcd56adb9a0ce55b53e4cb4e9064ebd13684e3a19abd0c87bd31f13daf7d241d0fcdc76e7f02debe671a8c66f6e658610451e8227a42550052cf20"}, {0x90, 0x117, 0x52, "44de6c33c07f663e54bbad5c52d9dc4f2de0ad4f8b2a59928f80a0cd91a93a4e1d4286f27b5a2041e015f19f3eb106171c97bd1e8d848b20cb816df58dfa149c2e125b4c0a8826b8e2bb0f3df270aed0bdc40aec9a53b559518b6639cd455b8c4ce0f2396fe5000c54bcf0094015fa8374721b5c6c20ef26130f03ac91ade271"}, {0x48, 0x88, 0x9, "b4426b91c50fe6b366b7e9c3630160210586234769e104b40ec362b6947f3f3c8d8924ed0e9922578dd1252708fe17d5bc79"}, {0x90, 0x107, 0x3, "32a0730175decdbc0b1faa2c18ed9c53d89adebf6dba7e54628cfbe507af70b7c523b452d7b4a1bc949b8cf2710b27d698e9173c29ae3661698fb18d38c927ea9118fab49107330d946d688a225c6eb8422188bdcb08b4ea305d1ace55c8fc993144e7c0a5bda50b56dbadc8e7501ecec90ebbd1d4959f2cb5"}, {0x1010, 0x10a, 0x3a3, "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"}, {0x18, 0x0, 0x9, "42e8d178e069"}, {0xf0, 0xff, 0x2, "f30d15f19dab0977bc2650320ef1d3edc3fb91fd4c9c8a7e7566f8405ddabedd97f07c598c7bd2108b485862b216bb1dbbfdec16f8c59859ec6b0fa1ef11d7af3073e93cfe7cfea9ce1232b2a00f55e5e429d06d01b4ed9cd6bd9232a3060216fb593891db9b5e65711c3be1bd630224284fe0adfe7a4ed34f018644767c7409fe8a214cf420ee60f268b47d27ce67825b6bd7b8effced7a70c46b02eca4541208ea454fecceb8bcc7a028d8e5f5e8c85a7150e059cba17d74064fc0e442c9d5b6028ddf13358b69a423b68f54dbecebfa33739b1b9b0395057284525dfa"}, {0x48, 0x0, 0x44a2, "27c6f51c27c321898f927e979170bb56ba01806d9617b0238e6e204ec652268194f2bc58c0cd2096a05708ae1e0bb808af64"}], 0x1390}, 0x3}], 0x4, 0x1) 13:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 803.242706] hfsplus: gid requires an argument [ 803.258861] gfs2: not a GFS2 filesystem [ 803.269359] hfsplus: unable to parse mount options 13:21:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x40000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 803.306230] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 803.440028] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) fanotify_init(0x0, 0x1) sendmmsg$alg(r0, &(0x7f0000002bc0)=[{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="e0b236cba24123f29e2e6ff7f4691a5df3e01f6b7307da70917b21c943a83cc24e1b328432", 0x25}, {&(0x7f0000000080)="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", 0xff}, {&(0x7f0000000200)="6cf4b707a3cebf9ab8bc03a8ea1940612ed649e8a0d90462d7ec22d4f3a8d8283f48520a6b8f3a6581975232be0109ab10a47743833d6c06e91cd15fd9d613df54efd521bf7252a5f1f5103dc51c89d45c49ad12ab950d3f3320cc24acff7a98f121c0a1d487a30d7c71ced389b6bdec620f545126a0832da024e202cb9b15598910b298c93d8ab7ceda521733bebaa11dab601569370bbffb88c43bbaeaa1", 0x9f}, {&(0x7f00000002c0)="f506ad5c6bcd5af9ed2b1535bab397f5886683015888b65451ca4c52dfd43aeb1156fe60921eb4ed306dbdbd49c67faa22b589a9b311ae43a25eeaa044780304dd7d7cb2dc46424bfbb77d5087457fa6f570c02afe736b2f40484ae59bcaad3ac7a3080dd0a7993947eee835da086fed4c9c9a5f015ae937a85215b334dcaf89622ccd3649f27aee267bb374e2313e677d492f4c41713124d876255c3079a3040d92a1761d8c715d24acd06b5134a8989712e30e8d84292479313cca70a241aefa0abd81f128517cca1c9a212907cd3f8f63c54143a205c3c4c03b45b58ab57520a9812e0da05531ec", 0xe9}, {&(0x7f00000003c0)="e0ae4ac5a6537c6c7a", 0x9}, {&(0x7f0000000400)="e3dc6f6514013833fdbe91cecfcd26ae1888d49578c080926f9cfcbc5d8dc9dd811da48b1c55ffeb91079dbc818d0bc5b737627e0d", 0x35}], 0x6, &(0x7f00000004c0)=[@assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}], 0x60, 0x20000000}, {0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000540)="27e9c545a6af40e908f04134b6f95ae1b04ca6b2f92f2669e836acc75b9158dc98ca449bf00a04b59a0a26ba41018480e451bb873e69ba643239bac9b74110176fc8c01c9369e38b7981fafd5cc1af2149f7731b90967784ba349623eb27473c7efd4d", 0x63}, {&(0x7f00000005c0)="ec84c2f007a9b5538d51d7730abe285fa03be0a3a845412dcc644a7c2b9e788b979be4c2e3c9147351bdc4734a684f2049faf300a7c43a58f683c245f1c52e2cb8a3e6ee34f7bd2790c55d75e8359d20e766c5cf116b883c73a8f8f939714be546a8549f0d03edf2d2c4884f2e69e140334323a0cadaff97b1", 0x79}, {&(0x7f0000000640)="777e65543cb8a820e921b2edc882d377d79698b60f12b4b27e015a48749041df13534c75a2934b7d1cd10ade5c184ec9cede2f9cb6ee4574be9b2da42570166b003ea88295aa6a41bf621bad5ca42f789e7e87026002152c28dba8716f413d2e173b", 0x62}, {&(0x7f00000006c0)="440de64b680d599ffbb7b340c42071e75f3e56c83c4958782d72d03df2c186", 0x1f}], 0x4, 0x0, 0x0, 0x8000}, {0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000000740)="91211ac8fb4c471cf4929297a1e3fc417587b27c7aab74fc3a9ae2fe917dea80e2177f59db27dbb864d12eb55db73bee0432a7a488cfcd6a79473571d9e913ce1bdff2be94c93cbf591a047ba654e1d36130afa991ce3532cb7453533b8f016eaf72699b7b1f45f0042a45c75f80b7", 0x6f}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="49627eacfb0f5782da08", 0xa}, {&(0x7f0000001800)="aa7a843bae8ef741971e6d78bb0a78c25c07c56592f1f41406df19bce37fd81c73efd524061eeb7a43c2e94de1ef17290f0a2295e59f12261c24290497672ce0256acb38bf34a3e6588b93ca2e502b596ce89105a1bb2eca7f5f8ba49738349f0fbbf5bb1e126f1a1d64e9d560380a999296c5676babf215d98bda35563d66d5422925afecbff082142e1d960b19e596081da3f24cdd0f8d51fd69fa051934da6ce8a1d9bdf62e07319b09ba2690fe84cd1ed42d0dc18cb27659e99de4c71dd7", 0xc0}, {&(0x7f00000018c0)="22734f6bc01c6e0e26475ce5505e762e4858e31be5fdb3891086cb177ae110ac13650e3f6195642a8e7c144d095cba8a0069bc418a7f84f0", 0x38}, {&(0x7f0000001900)="00ba5e91876c9c4854cbe3021bd2b2bf8d4ca5f3bd19194ff6395ab33ad2dc91d75108c4861d94d964ed5a56492cbe43665f2d67896c69a482cfdd9ecdd8c0e3dbb960bd55ce7f5edc5efaaa2620166e5321e573d378d99a572505a3aa115fb5c6f881dcc8dc00585b063bf4c80087c7359842b90f52f4ba865cc0b749c335229c7c5eb35a2f8ca1000c97ec510b679fc8345afe32d11f0e39068dfa2815a09ec52b480b560178c81fdb112ad20ef7aeac6c9bec9fd1b0729dd5c29e1c5d2a52cac875ca7da5", 0xc6}, {&(0x7f0000001a00)="ee583ee5de2bbd4106badca52232d6cf6ed28d96b73648728e06a621e5c2b43d62fc25cd679640f35d452c1d43cc441888a86d2d16f370aab8464bdb5191336e70597d5752f20c19a38de801a41bb77dd0e165560ccb5941edc5c199b1", 0x5d}, {&(0x7f0000001a80)="b578512636b3e0ce25df5b4b670d124de3d82139d13417e190dbf2f0b20b370238330dbce53674c39edb6b06b84d2b5aecb67c852ed37e2efd9c69af8107d1dbee44721b661bd87722ff47415bcef56c61e555b1ab805fe4a98817de1570df34c91ea9052bb34c4cac8781493fce9fc71d30c1f1e973937fed9f2537f206c2f5929220c55666ccf83114d910f7bda7929f3a9dce69462c4ebc2790a8bde3208cbb39ab", 0xa3}], 0x8, &(0x7f0000001bc0)=[@assoc={0x18, 0x117, 0x4, 0x38ef}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0xa0, 0x117, 0x2, 0x8c, "91e12359e49cef24a2d01cdf7aaca9996dc2d1428e60651fd381cb1b6046e706da39fa4b4924b12854a6f2f577d61a78e8121de6e4c9431a3b1a0fe4caa3c50a75f486789a3fef8b9e68b1a9a063f309f1945eb9a1680162ac01ca5ab0368c6fb1764d74e34702b0b5e581213e4b65f25a6f4cc181bd231f44ac362f213062d7a301a1f73deed24f37ee60cb"}, @iv={0x70, 0x117, 0x2, 0x5a, "82c8d1fe0a36a27f45f7f7f2297fe68665d53432e2c7b72f8170eee6bf1210128447baf3af1267ec82c50f8f06ad69dd4fc99eaafec2c857e20757c7b56561729e108d5de8fa353c32240c2cc47a0ddcb6105018aece94029e55"}, @assoc={0x18, 0x117, 0x4, 0x8001}, @op={0x18}, @op={0x18}], 0x1a0, 0x6066d51165398ca3}, {0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000001d80)="3023cb3fdbdce3c7ed8362b1ab9f1b2ae6dec405c4419547278602ab1235e2ad53b8327417822d38b64de5b9b64cd7cf0de7400e53a671bb6b4254c0586b6f0b3e23af2146f95b169fa749e73c4bc3f44a27d5a6c2e7db3faf4684d9cca6d2c0b6c63669f8edf528a0dd53d03cf68ed61c507519a3269039678926b7838ddebd1bfe14751251c5dabc093106f25a7e71d8a345de1b912f4e90968a0bc59d75b38388c8b6f8d7c61809db32ee73e88216bbe9f100b588d0779b0401c58f7ebc2ce22023d1b93ad22de11870959df5f897b43f4d85b58686c451ce10f3a5e1", 0xde}, {&(0x7f0000001e80)="6d50a34efd834ec4c24f378505bd7a942345ae1eb515254da8534d547cac349bf677ae21f5ecde39cb5af939", 0x2c}, {&(0x7f0000001ec0)="0ff114b4b26f5cd16612ba55b76e95adbc07a31b6b913ac75b0196fa68bac882e7f0879cba43d0e95f47f6a29dd7d99209b95bbea48891cf19a6743d112a04a6847197eb3dd88ce0467e34dac960a4a7913a4c7877dec656ec59dff29c9ee861211ce60aeac408556f88e32e0a3641", 0x6f}, {&(0x7f0000001f40)="78c9c0961b071082020fcaa074c2865f19508f2235907e8113a6fb79d218b0c72fe347cc3bcfb184a07c9f2357161b85ea75b7c332774e954be464c05d655ebd99a6e637a90fc201f65b34dc403de90640687ef069f35d44f013963eec3685868f857416515bb6ab51d9c5a3ec9feeacb2489b412603354b27256cb7e88532c3a5b69c05752735602c9a07472cbf9c88793dbeb1fc9a48161b2397e45d153766d31c0c7924c132d8b0cbe215568fe3f839c7279856b4d438b8a64b81689617ea8eddcd3608615f972a921a075426", 0xce}, {&(0x7f0000002040)="045ed73bdce0d31233c8630934ca50b073c8219f7963a930df7ae58a8b85564010ba0c26eedcee05", 0x28}, {&(0x7f0000002080)="4b3b1a5390fd8c18fcbea354419a7be1064fc03bdccb6f3251864965435b7b39acb2e636805f4aeb38d537c76950f2be6e1d40866ef1cb220ceb16365e6c2272e40ddd52efe362adecd354a26587daf3977ab5d3d73dcd76701098e9b87ae913995b3cfe7c52b943ca25fd8f4ae36e15b0c4dacb65aa17a364e2f140b61676", 0x7f}, {&(0x7f0000002100)="28b762ab20615930de68399a0defcea36e23c45b3e6d7c102b3625bc19c3740fdfbf5a327790dedeb2b8acb818907b115484ec89a2933e768f42cc56ad4b6183fc349c87c5abe61b7624703dac08fbfdba5d98ac92e25b5609b3e57e0fc63bf01d7c3b4afa4bb574a83bcc4b921ad218", 0x70}, {&(0x7f0000002180)="63e224f2", 0x4}], 0x8, &(0x7f0000002240)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0x7}, @iv={0xc0, 0x117, 0x2, 0xac, "f001322ca1f04a415c025c0699f6de7155740f091cfa815401016b2dbea254857fe031247d22bd38d6cb7f536ca133b09666ff588cffe5d09279f845f628fa0a0ad30529c45cdaa76a035b5b38d170be1ccc92482e9d97d3e87d81939bf8821a5dd51fba564e0b74efd448a71135465c412e618c09aeac775273166791bd563ace5171f6122c1a6f53d8a8c62a4c9d5b6b542d6107caaa92e77c3f1122925a9859015d151f28d823e1843c22"}, @iv={0x58, 0x117, 0x2, 0x43, "f704c70198e30a60a0f4eef421e01b91f99aeb502faf7c37c9ebae1c669e49ddf5958d2dc05f1335b2070a91b6364eecc63b85d77896baf9fbf6e5fe8bc35f6330ef2f"}], 0x160, 0x20000000}, {0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000023c0)="25de3de9e0fda49f763eccf09944f8a8a8baa81934ee1587191dba7ebd814abe61f3302c10e6c67b799c312059588fdde23e3ff26ab88fb3ab81d5f1eaded7502f28844c1b183a22ec55989db9f2f68055e74ae850795646ed59b9c1e8f3a429a6af9cd24c51c46c8ccd25f90cc9256fc7e6d6f673bcc610bc563bb599f7adc40c0f10612705cb5f6fe8fbfb7ace843e894dc5fedfc81fdb2fc4e5f68ec75c262d4b2cb12791f2e50a003844972003f81528ca9c7c6d31b53e5c9172e11ced0782cb6d863a59a8c9a1ccfd8e210405d6e035d8f792cc4f0a1307925b9d99221c8d849f3857", 0xe5}, {&(0x7f00000024c0)="fc5084bb51a22e1836c8dcf268b03a4b6597d2c9318adad498b6387c77f4ac01848e6c829da41c7d7468aa93972c5e289baadb54b5442a141f", 0x39}, {&(0x7f0000002500)="c63de9124176b56711a0dca0c715d8af3cd721b698f5d77b1aa40e04851e0a8b84858aa8d9898639d40ed1dddc4d276c9a2aab80b415c7443fadc67871c8d1b794417b89728f49040345f5012f40a67a44a1c5d475a8c8a64e0ecb919c86892b7cf39df8353978f9ed6fc32c1878b04412be6bcab7fbe7e0cb0c487d837f76c009ea9c2505f320c09ef9cbb781651c9c70435d852e389dd0187f9e858cb0204cb7d943517094ab9de6d1f035ae9301b3e37b870a56aa7ba90574771c3d72f22f31601dc1002634adcbf171cbe2b7d03d94c321f09b031a2f4d391e6e29595a378bc2b29860", 0xe5}, {&(0x7f0000002600)="ed130e16f63c837b747cbbae996798cd239293119f55843b8c3118ae584b27121da1f2477abd1608da5bcb17d2a189eb1919aa6e57fe63c576775cf92f2fb0d177118a0c8f497d6ebb74b59427d2859717dcf3f6bb1a3708693fc921bf8105618938566e3319e205a6a9c894a62c0e07854d0357f5606cb7600a1d3e71a6c921ffddecadd0db78f4e30ca648790b2b62d8c5bff2559cc4cc5c4de057205099a0d3c28d9d64cd67c7395f30", 0xab}, {&(0x7f00000026c0)="b508b3422271671e3869ed35afe9535432aa993eee666b62a794087eeaffa7ac4944959495fc45bff529b8aedaf6f251a5f67889b200690370d2f8513c4c85e61cc37527179f160e69f7cf87a82bf1d348b24f51313396f3f5d7a4bc77f0f4f2f7a2c7da1a90e263c2bdd51d465c7a96f5bad128687346784c1607dc3c2cb6eaa7c5ab40bd80cb1af66ed59e95c767575dda8d4831e13634f1cb76b0c3c19102f9e15c51e523c3c8c6f463677539229355233c3359685f65adce35c86765cc", 0xbf}], 0x5, &(0x7f0000002800)=[@iv={0x60, 0x117, 0x2, 0x4c, "753b5efea84390bc0a0a5c941fa762edcb6ccd10a88e82c1b6344822e3c60de272cbda67fd796eb47fd2ff44ff71a9a39c3f7d095ef708ce956ce895d84e993afe663685fc08b5e9a219c9c4"}, @op={0x18}], 0x78}, {0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002880)="65cf8becf58e2487a576203920a537b358c1ae75f50308e7247992f2da317102c0063680e0c37abc94764240a6a6bbbc40df990533aad93b2c0cd7648fa46031eed6bde4b740adb1e80ee8849f8fde73b810c924e317a5395c279c07f640fb2f4944a6e539a77e77259e3d52eb9872b61d0ba0379b588a31f68e30cb8286aa14abb65b3a916b7c8d2849244751ade7f56a67dc5f46443a711e150fa1bb6078b5cf44f9bde3a13a004d77bfb1f4adf35d98fbc7335267d9040e", 0xb9}, {&(0x7f0000002940)="9447ad3852d045c9d0938620eb7cf0e6e41a99f4511a72bb484922712e02dc5257965bdb65a05eb67785729dc12a8e1772491e11a4086e17483b2ca6d14a8fcf27d0490551ff38b21ec5fa8727f17acb5b3cfa5fa5129f6765e972302eeeef2b64827dfd734a174b39c26055c87b99e28b7a05338f5e6b03e7a7fddaed1ef501f5ae59fddfb247b73e9c970feb165f2b973a3e9f205442208b4c492b9be7b595cee3247209b55589190ccf54", 0xac}, {&(0x7f0000002a00)="edacecb885e149aeaa560ba0cfb37223236fae0d9acdbd22ae", 0x19}, {&(0x7f0000002a40)="11da2280031334d6fc45df4d4f30680f3805193d163ef375c10ffb4a4022031958b87b90a69676", 0x27}, {&(0x7f0000002a80)="438b710af9a9163d792daa58b959331b18c6e129c03c7799d50fe6096fd5", 0x1e}, {&(0x7f0000002ac0)="0779ba9c0937e3ad0df2e0c676eada74dd3a823dac8ae768256fa77ad38f35cdffc46445ba3a0426f629ed2eeed25e1a44cc16", 0x33}], 0x6, &(0x7f0000002b80)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40014}], 0x6, 0x4) 13:21:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x48000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:18 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ed, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:18 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1b0f0000, 0x0, 0x0, 0x0, 0x0) 13:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x301, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 803.639450] gfs2: not a GFS2 filesystem [ 803.679331] hfsplus: gid requires an argument 13:21:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ee, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 803.700911] gfs2: not a GFS2 filesystem [ 803.714625] hfsplus: unable to parse mount options 13:21:18 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, 0x0) 13:21:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x110, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/49) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 803.806600] hfsplus: gid requires an argument [ 803.811127] hfsplus: unable to parse mount options [ 803.823394] net_ratelimit: 20 callbacks suppressed [ 803.823401] protocol 88fb is buggy, dev hsr_slave_0 [ 803.833481] protocol 88fb is buggy, dev hsr_slave_1 13:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x302, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x60000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:19 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 803.959926] gfs2: not a GFS2 filesystem 13:21:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ef, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 804.027767] gfs2: not a GFS2 filesystem 13:21:19 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x4, 0x4000) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x2, 0x4) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x3f, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20002, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000000c0)=0xa3a2, 0x1) 13:21:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 13:21:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x68000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x303, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 804.143418] protocol 88fb is buggy, dev hsr_slave_0 [ 804.148569] protocol 88fb is buggy, dev hsr_slave_1 [ 804.151548] hfsplus: gid requires an argument [ 804.153710] protocol 88fb is buggy, dev hsr_slave_0 [ 804.163235] protocol 88fb is buggy, dev hsr_slave_1 [ 804.168116] hfsplus: unable to parse mount options [ 804.236782] hfsplus: gid requires an argument [ 804.242586] hfsplus: unable to parse mount options [ 804.273516] gfs2: not a GFS2 filesystem 13:21:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6c000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:19 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x121000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x46e, 0xb5, 0x101, 0x2, 0x5}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x4000, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'bcsf0\x00'}}) 13:21:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, 0x0) 13:21:19 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x1b', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x304, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x74000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f1, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 804.569860] gfs2: not a GFS2 filesystem 13:21:19 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x6000, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000080)) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)) 13:21:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7a000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x305, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x23000000, 0x0, 0x0, 0x0, 0x0) 13:21:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f2, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x4, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffd33, 0x1f}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2) 13:21:20 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus ', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 804.822268] ebt_limit_mt_check: 21 callbacks suppressed [ 804.822276] ebt_limit: overflow, try lower: 2147483647/65537 [ 804.827071] gfs2: not a GFS2 filesystem 13:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x306, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0xfeffff07, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:20 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x40, 0x35) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x24030, r0, 0x100000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) [ 804.943391] protocol 88fb is buggy, dev hsr_slave_0 [ 804.948484] protocol 88fb is buggy, dev hsr_slave_1 13:21:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f3, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 804.989868] gfs2: not a GFS2 filesystem [ 805.002803] ebt_limit: overflow, try lower: 2147483647/65537 13:21:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x28030000, 0x0, 0x0, 0x0, 0x0) 13:21:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x307, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x10000) 13:21:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f4, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:20 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x0f', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 805.178666] ebt_limit: overflow, try lower: 2147483647/65537 [ 805.209345] gfs2: not a GFS2 filesystem 13:21:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000040)={0x4, 0x0, [{0xd, 0x4dc, 0x8001, 0x4, 0xffffffff80000000}, {0x80000019, 0x6, 0xff, 0x4, 0x1000}, {0x80000000, 0x6, 0x3, 0x3, 0x8}, {0x80000019, 0xc4e3, 0xfffffffffffff000, 0x2, 0x2}]}) [ 805.263513] protocol 88fb is buggy, dev hsr_slave_0 [ 805.268618] protocol 88fb is buggy, dev hsr_slave_1 [ 805.362588] gfs2: not a GFS2 filesystem 13:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x308, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 805.400927] ebt_limit: overflow, try lower: 2147483647/65537 13:21:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x0, 0x0) 13:21:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f5, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:20 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000080)={0x8, 0xd8}, 0x2000c0) r1 = dup2(r0, r0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x17) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x22, 0xa8100) write$input_event(r2, &(0x7f0000000000)={{}, 0x5, 0x74560aea, 0x8}, 0x18) 13:21:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 805.527363] ebt_limit: overflow, try lower: 2147483647/65537 13:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x309, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 805.672361] ebt_limit: overflow, try lower: 2147483647/65537 [ 805.708969] gfs2: not a GFS2 filesystem 13:21:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:20 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f6, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 805.791767] gfs2: not a GFS2 filesystem 13:21:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 805.864707] ebt_limit: overflow, try lower: 2147483647/65537 13:21:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x34020000, 0x0, 0x0, 0x0, 0x0) [ 805.906649] hfsplus: gid requires an argument 13:21:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f7, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 805.941859] hfsplus: unable to parse mount options 13:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 806.022335] ebt_limit: overflow, try lower: 2147483647/65537 [ 806.039155] gfs2: not a GFS2 filesystem 13:21:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x2b7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) recvmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/185, 0xb9}, {&(0x7f0000000340)=""/120, 0x78}, {&(0x7f00000003c0)=""/24, 0x18}, {&(0x7f0000000400)=""/175, 0xaf}, {&(0x7f00000004c0)=""/144, 0x90}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/39, 0x27}, {&(0x7f0000000640)=""/90, 0x5a}], 0x8}, 0x10000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000780)={r1, @in6={{0xa, 0x4e21, 0x2000, @mcast1, 0x4}}, 0x7cadbcb9, 0x7f, 0x2657, 0x3, 0x80}, &(0x7f0000000100)=0x98) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000880)={0x8, 0xffffffff, 0x100, 0x100000000}, 0xfffffff6) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup/syz0\x00', 0x200002, 0x0) 13:21:21 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 806.108960] gfs2: not a GFS2 filesystem 13:21:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f8, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 806.160755] ebt_limit: overflow, try lower: 2147483647/65537 13:21:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 13:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x3) 13:21:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 806.284385] hfsplus: gid requires an argument [ 806.291759] gfs2: not a GFS2 filesystem [ 806.302988] ebt_limit: overflow, try lower: 2147483647/65537 [ 806.316234] hfsplus: unable to parse mount options 13:21:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2f9, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 806.406826] hfsplus: gid requires an argument [ 806.411383] hfsplus: unable to parse mount options [ 806.414991] gfs2: not a GFS2 filesystem 13:21:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) 13:21:21 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x10', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:21 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x4e20, 0xdb, 0x4e24, 0x4, 0xa, 0x20, 0x80, 0x0, r1, r2}, {0x1, 0x6, 0x800, 0xfffffffffffffff8, 0x6, 0x20, 0x7fff, 0xffffffffffffffff}, {0x6, 0x800, 0x800, 0xa10b}, 0x9, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4d4, 0x3b}, 0x2, @in=@rand_addr=0xfffffffffffffffc, 0x34ff, 0x3, 0x1, 0xed1, 0xffffffffffffff81, 0x10001, 0x1f}}, 0xe8) 13:21:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fa, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 806.618891] gfs2: not a GFS2 filesystem 13:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 806.730155] gfs2: not a GFS2 filesystem 13:21:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x10001, 0x1, 0x100000001, 0x10001, 0x4}) 13:21:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) 13:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4800000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fb, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:22 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 806.969628] gfs2: not a GFS2 filesystem 13:21:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000040)={0x6, 0x3, 0x4}) fcntl$getown(r0, 0x9) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) 13:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x4c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 807.016924] hfsplus: gid requires an argument [ 807.032867] hfsplus: unable to parse mount options 13:21:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fc, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 807.147943] gfs2: not a GFS2 filesystem 13:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x310, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6000000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) [ 807.194518] hfsplus: gid requires an argument [ 807.208764] hfsplus: unable to parse mount options 13:21:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x80002, 0x0) bind$bt_l2cap(r0, &(0x7f00000003c0)={0x1f, 0x6, {0x49f9, 0x1, 0x100000001, 0x0, 0x45, 0x40}, 0x0, 0x10001}, 0xe) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x280800, 0x0) connect$rose(r1, &(0x7f0000000080)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) close(r2) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000300), &(0x7f0000000340)=0x4) r3 = add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300), 0x0, 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') socketpair(0x8, 0x0, 0x3ff, &(0x7f0000000600)) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xe8, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfdd}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc8fa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0x40) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000200)="3de0b8c81c3f44327835eed36ef81cafb4106385f9e40b0e43b0f761b745429e50ce044a32852f67eaea374331f221c2c86ca280a874e044342ca9384d1e087c6262e7b3b0e66a39ea7806071d88b31af43e8143fcb30fbeb931bf91e8a37424d6ea0908bacd15b27db594b71dbdac153b", 0x71, r3) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000100)=0xc9) 13:21:22 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fd, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 807.308459] __nla_parse: 31 callbacks suppressed [ 807.308470] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 807.341410] gfs2: not a GFS2 filesystem 13:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6800000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x311, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 807.451363] hfsplus: gid requires an argument [ 807.457482] gfs2: not a GFS2 filesystem [ 807.462045] hfsplus: unable to parse mount options [ 807.468926] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x101000) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, 0x0) [ 807.505540] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x6c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 807.553892] hfsplus: gid requires an argument [ 807.558396] hfsplus: unable to parse mount options 13:21:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x312, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7400000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 807.698497] gfs2: not a GFS2 filesystem 13:21:22 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffffad, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x313, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 807.746767] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 807.768272] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x7a00000000000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x60020000, 0x0, 0x0, 0x0, 0x0) 13:21:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2ff, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 807.893984] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='cpuacct.usage_user\x00', 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000001640)={0x1f, {0x8, 0x3, 0x7ff, 0x3cd, 0x3}}, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000001540)={{0x2, 0x4e24, @loopback}, {0x306, @remote}, 0x28, {0x2, 0x4e23, @remote}, 'irlan0\x00'}) io_submit(r3, 0x5, &(0x7f0000001500)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x9, r2, &(0x7f0000000200)="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", 0x1000, 0x4, 0x0, 0x2, r2}, &(0x7f0000001200)={0x0, 0x0, 0x0, 0xe, 0x101, r2, &(0x7f00000000c0)="a21463f0042ee08a6c233282a6b5ddb3c6c314a60e2a63289c983fb02097026b478a825260dec9746e70234d46a74f066d8d8dd1e91dcc0b73f3266bb24169dba71139541e2ac54ac4a28eaaca767bf362dfe7aaa01f9da3c5fa8ff0cd6c6151c055cc72d6fe8b9ae727983f3514be612113a21c0b1d624c73cffd1b917fa4c093b95eeaf575e7c3f14b9499caa19df2e21405bc0b9d4495230832b72c415afa4929876dd9fa7d4cfabb07cededc04b0a35909b3148c8b4457", 0xb9, 0x9b3, 0x0, 0x3, r2}, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x1, 0x7ff, r1, &(0x7f0000001240)="f58f08beeb5df55d4372a754ab03f64523e9a5ab9a0ec6e95fed60c51df9c5e86ee23e077254ac50da37e7c109e5a0161d55575acbcddf0451e24086ac3ad6ba71dd835dc0b8bdb9f3db6e9f79379b0890b2b8d6bb883c88461a687cff37f1f7a676369ec333dab6bb1040098a9bfcc5057b827b4ffa5f7931c2a087ba2a86e4fcd70ce0b703f71d48e84521aeaad89f7a4dd6c710382dd55b2dbcf69e3a90c424c0a2097425d6af", 0xa8, 0x0, 0x0, 0x1, r2}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x2, 0x1, r2, &(0x7f0000001340)="e8a6b6cd35b21fe4f7b51b5e6fee2be82292cdae075747b3c58efb1e53cff5eeadee591a51cbe55370a497b8353c501a3959515faf41dbf1a51b", 0x3a, 0x3f, 0x0, 0x2}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0xf, 0x3f, r1, &(0x7f00000013c0)="5fcaaa078a97fdd244500578e2067f88eeef43cfb3ffcfbeb79ac0ef14b145c64bbef98ff34628bce2961ed32301a5c35c5d09efbb434adc876cd28c3cab8966cfcb0d93e05706a34f2fa5e3fa2d2523b9529117fb2db5c7403b459655dbab73b229559ed9696c87aa3085cb9c6445463c97dd4ca7107d1b0b1a2c94b5889866b9b0152029fda036a6daac9c457f7a029eed40fe52b1928b2740304aa3f7ca06ca80e472e89846928f98f586e04ea34af028cd4f5129e588c65470faadafd5c4217caf2f44f75af9905948", 0xcb, 0x10000, 0x0, 0x0, r2}]) 13:21:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0xfeffff0700000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x314, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 807.970283] hfsplus: unable to find HFS+ superblock [ 807.987950] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 808.011028] gfs2: not a GFS2 filesystem 13:21:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 808.148301] gfs2: not a GFS2 filesystem 13:21:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:23 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) [ 808.191047] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 808.230325] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:23 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8f0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0xee2f, 0x40) pause() setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x5, 0x373c, 0x101, 0x5, 0x2864d902, 0x924, 0x6, 0xb70, 0x8001, 0xffffffff80000000, 0x100000000}, 0xb) 13:21:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x315, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x2, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x301, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 808.343745] gfs2: not a GFS2 filesystem [ 808.391693] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 808.423903] gfs2: not a GFS2 filesystem [ 808.428571] hfsplus: gid requires an argument [ 808.450065] hfsplus: unable to parse mount options 13:21:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 13:21:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x316, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x3, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 808.542266] hfsplus: gid requires an argument 13:21:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x302, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 808.576231] hfsplus: unable to parse mount options [ 808.635657] gfs2: not a GFS2 filesystem 13:21:23 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x317, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 808.714884] gfs2: not a GFS2 filesystem 13:21:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) [ 808.782223] hfsplus: gid requires an argument [ 808.808715] hfsplus: unable to parse mount options [ 808.903956] hfsplus: gid requires an argument [ 808.909081] gfs2: not a GFS2 filesystem [ 808.913839] hfsplus: unable to parse mount options [ 809.103418] net_ratelimit: 20 callbacks suppressed [ 809.103425] protocol 88fb is buggy, dev hsr_slave_0 [ 809.113561] protocol 88fb is buggy, dev hsr_slave_1 13:21:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x5, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x303, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:24 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0xfffffffffffffffd) 13:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x318, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:24 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, 0x0) 13:21:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20900, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000080)) fgetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000100)=""/32, 0x20) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 809.307055] gfs2: not a GFS2 filesystem [ 809.326747] hfsplus: gid requires an argument [ 809.341720] hfsplus: unable to parse mount options 13:21:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x304, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x319, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 809.423425] protocol 88fb is buggy, dev hsr_slave_0 [ 809.428515] protocol 88fb is buggy, dev hsr_slave_1 [ 809.433725] protocol 88fb is buggy, dev hsr_slave_0 [ 809.438814] protocol 88fb is buggy, dev hsr_slave_1 [ 809.444910] gfs2: not a GFS2 filesystem [ 809.461276] hfsplus: gid requires an argument 13:21:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 809.473533] hfsplus: unable to parse mount options 13:21:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) 13:21:24 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2000000000, 0x100) 13:21:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0xa, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x305, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/142) [ 809.710278] gfs2: not a GFS2 filesystem [ 809.730243] hfsplus: gid requires an argument [ 809.744733] hfsplus: unable to parse mount options 13:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x48, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 809.817331] gfs2: not a GFS2 filesystem [ 809.826182] hfsplus: gid requires an argument [ 809.830694] hfsplus: unable to parse mount options 13:21:25 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x306, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x90200, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@multicast2, @loopback}, &(0x7f00000000c0)=0x8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x0) 13:21:25 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x90030000, 0x0, 0x0, 0x0, 0x0) [ 809.961008] ebt_limit_mt_check: 24 callbacks suppressed [ 809.961017] ebt_limit: overflow, try lower: 2147483647/65537 13:21:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4c, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x307, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 810.061365] hfsplus: gid requires an argument [ 810.063483] protocol 88fb is buggy, dev hsr_slave_0 [ 810.070995] protocol 88fb is buggy, dev hsr_slave_1 [ 810.095853] hfsplus: unable to parse mount options 13:21:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfffffffffffffffc, 0x2) [ 810.168425] ebt_limit: overflow, try lower: 2147483647/65537 13:21:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x60, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 810.219763] hfsplus: gid requires an argument [ 810.224833] hfsplus: unable to parse mount options 13:21:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:25 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 810.288914] gfs2: not a GFS2 filesystem [ 810.337100] gfs2: not a GFS2 filesystem 13:21:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x308, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x68, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 810.357331] ebt_limit: overflow, try lower: 2147483647/65537 [ 810.383437] protocol 88fb is buggy, dev hsr_slave_0 [ 810.388590] protocol 88fb is buggy, dev hsr_slave_1 13:21:25 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x800) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:25 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa0000000, 0x0, 0x0, 0x0, 0x0) [ 810.448933] hfsplus: gid requires an argument 13:21:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 810.485868] ebt_limit: overflow, try lower: 2147483647/65537 [ 810.486620] hfsplus: unable to parse mount options 13:21:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x309, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6c, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 810.554237] gfs2: not a GFS2 filesystem 13:21:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0xc8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) socketpair(0x9, 0x3, 0x40, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r2}}, 0xffffffffffffff50) bind$ax25(r1, &(0x7f0000000040)={{0x3, @default, 0x8}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 810.656485] hfsplus: gid requires an argument [ 810.667997] hfsplus: unable to parse mount options [ 810.676721] gfs2: not a GFS2 filesystem 13:21:25 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa6010000, 0x0, 0x0, 0x0, 0x0) 13:21:25 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xc0', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 810.805891] ebt_limit: overflow, try lower: 2147483647/65537 13:21:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x74, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 810.897313] gfs2: not a GFS2 filesystem 13:21:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) [ 810.969775] gfs2: not a GFS2 filesystem [ 810.984330] ebt_limit: overflow, try lower: 2147483647/65537 13:21:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7a, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa8000000, 0x0, 0x0, 0x0, 0x0) 13:21:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:26 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 811.111932] ebt_limit: overflow, try lower: 2147483647/65537 13:21:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x300, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 811.157024] ebt_limit: overflow, try lower: 2147483647/65537 13:21:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x800) [ 811.254747] gfs2: not a GFS2 filesystem 13:21:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x320, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 811.307123] gfs2: not a GFS2 filesystem 13:21:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 811.330677] ebt_limit: overflow, try lower: 2147483647/65537 [ 811.342022] hfsplus: gid requires an argument 13:21:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x40000008001, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0x0, 0x81, 0x5f}) 13:21:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xba010000, 0x0, 0x0, 0x0, 0x0) [ 811.375002] hfsplus: unable to parse mount options 13:21:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x500, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x321, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 811.492627] hfsplus: gid requires an argument [ 811.499561] gfs2: not a GFS2 filesystem [ 811.502477] hfsplus: unable to parse mount options [ 811.518007] ebt_limit: overflow, try lower: 2147483647/65537 13:21:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x600, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 13:21:26 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) 13:21:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x700, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x322, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:26 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0xa00, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 811.824512] gfs2: not a GFS2 filesystem [ 811.827201] hfsplus: gid requires an argument [ 811.833047] hfsplus: unable to parse mount options 13:21:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 811.879010] gfs2: not a GFS2 filesystem 13:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x323, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xd4030000, 0x0, 0x0, 0x0, 0x0) 13:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x2000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 811.998636] hfsplus: gid requires an argument [ 812.003253] hfsplus: unable to parse mount options 13:21:27 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8000, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x9) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)) 13:21:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x30f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 812.093789] gfs2: not a GFS2 filesystem 13:21:27 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x3f00, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x324, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 812.173938] gfs2: not a GFS2 filesystem 13:21:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xea030000, 0x0, 0x0, 0x0, 0x0) 13:21:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffb, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="560ceb31dbd18923c6b41acfbe557dfb246d379b15b1f14960ae22ea1631614ca42c2d088888a4e077486beec89e74e69bf6515080f7cb6c1336164858bef67b8b4d3003e8f022753bbd5eb9a453c1bb2bbdcfd428553360e73e8ff4329ca6bbd65f6aa2ca8628c7ac1f03750f06f2edf4d4db44ac4471d3ab34aed66602c48e4ce3bf8e63692da757425e9c4d2f82f19e1a8f1c1322bcc59bf717f3272700cc1f06056ede44570ac43539aa19a1e36ee701214f9166706fae7587b79fdcf9851902aab80f40c95c9b252d30", 0xcc, 0x401}, {&(0x7f0000000300)="809d3a1814c8e235029c04da086409ae4782f3cda9e2d8db089440d367723dc40df3e5043e1949dee85ee2504f9824fb5cc9f3495417e27e9001a9077a5801cc237d8a6b1cbd140c66ec98a8224691daa6ea3135b35d29fd9ce6651cfcf0a76ab6b6b76c2f60f102a191e08420ddf179ec318af23855e04459acb4bdc51c000e8d9d416f60940f67ea4a7d87cbc1245ea927c80a28b105b0869172eaca1b577e30a52941e459a6dfa5bf070de407e3104e5ebb2618b1ccfbce8a294afde97df7bcb745389e8a59", 0xc7, 0x6}], 0x102080, &(0x7f0000000140)='\\bdev.mime_type\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/30) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005540)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000005580)={0x1d, r2}, 0x10) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000480)='ceph\x00', 0x5) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000400)) [ 812.252186] hfsplus: gid requires an argument 13:21:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x310, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 812.293176] hfsplus: unable to parse mount options 13:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x325, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4800, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 812.371564] hfsplus: gid requires an argument [ 812.391127] gfs2: not a GFS2 filesystem [ 812.400238] hfsplus: unable to parse mount options [ 812.451377] __nla_parse: 30 callbacks suppressed [ 812.451388] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:27 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0xa4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:27 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 812.498663] gfs2: not a GFS2 filesystem [ 812.534280] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x311, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4c00, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x0, 0x0) 13:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x326, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/capi/capi20ncci\x00', 0x80202, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001500)={@ipv4={[], [], @empty}}, &(0x7f0000001540)=0x14) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x0) [ 812.684187] hfsplus: gid requires an argument [ 812.696972] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 812.710181] hfsplus: unable to parse mount options 13:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x312, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 812.795040] hfsplus: gid requires an argument [ 812.795852] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 812.799553] hfsplus: unable to parse mount options [ 812.813274] gfs2: not a GFS2 filesystem 13:21:28 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x10000000000000) [ 812.902069] gfs2: not a GFS2 filesystem 13:21:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6800, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x327, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 812.935223] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:28 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf0030000, 0x0, 0x0, 0x0, 0x0) [ 812.996185] hfsplus: gid requires an argument [ 813.011870] hfsplus: unable to parse mount options 13:21:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x313, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6c00, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 813.057734] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 813.086727] hfsplus: gid requires an argument [ 813.091245] hfsplus: unable to parse mount options 13:21:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8000, 0x800000000005) [ 813.158680] gfs2: not a GFS2 filesystem 13:21:28 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x328, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 813.183733] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 813.214863] gfs2: not a GFS2 filesystem 13:21:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7400, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:28 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf4010000, 0x0, 0x0, 0x0, 0x0) 13:21:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x314, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 813.315873] hfsplus: gid requires an argument 13:21:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040)="34107bdb50ae740c66adaa481da56338a606db937b105f0c5aa15397a7bf18f7c4fab17766191254ba6b12f63d8d8dd1e59013e31b37e11febd5fccc2c2a33a974269dde3db50128da3385fc085178caa1001bf604361f16053e9c1bac47bc98a1e671b752077cc64255264c5412fb630bac0004cfcd7613e529550503bfac737da0f92989a8922ede66d8577118789337c3d82b25636cc693a7bd288c00fed9b4d22cbd54aaf738e419fa7856cda0b9bd9d64fee0efab37d62140a5066263b3bb4f4b523c797e9e239ba3566f81ee087a2f9d6ebc", 0xd5) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x2000000000003, 0x2) [ 813.342140] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 813.343826] hfsplus: unable to parse mount options 13:21:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7a00, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 813.448067] hfsplus: gid requires an argument [ 813.452602] hfsplus: unable to parse mount options [ 813.452663] gfs2: not a GFS2 filesystem [ 813.463122] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x329, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='veth1\x00'}) 13:21:28 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x315, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 813.596693] gfs2: not a GFS2 filesystem [ 813.611776] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x1000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:28 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x0, 0x0) 13:21:28 executing program 2: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 813.685392] hfsplus: gid requires an argument [ 813.689926] hfsplus: unable to parse mount options 13:21:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x2000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x316, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 813.821900] hfsplus: gid requires an argument [ 813.841649] hfsplus: unable to parse mount options [ 813.843923] gfs2: not a GFS2 filesystem 13:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x3000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:29 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 814.050419] gfs2: not a GFS2 filesystem 13:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:29 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x10001, 0x0) r1 = dup3(r0, r0, 0x80000) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x22, 0xcf4, 0x5, 0x1000, 0x0, 0x100, 0x10022, 0xb, 0x2, 0x3ff, 0x9, 0x6098, 0x101, 0x2, 0x10000, 0x10000, 0x100, 0x3, 0x2, 0x6, 0xe58, 0x100, 0x0, 0xe68, 0xbd5, 0xb1, 0xffffffffffffff01, 0x6, 0x6, 0x101, 0x9, 0x80, 0x6, 0x1ff, 0x40, 0x6, 0x0, 0xd37, 0x4, @perf_config_ext={0x40, 0x6}, 0x0, 0xba1, 0x80, 0x4, 0xfffffffffffff000, 0x3f, 0x4c}, r0, 0xa, r1, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x20000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000040)={0x2, 0x0, [0x0, 0x0]}) 13:21:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) 13:21:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x317, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 814.136517] hfsplus: gid requires an argument [ 814.148918] hfsplus: unable to parse mount options 13:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x5000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 814.223464] net_ratelimit: 20 callbacks suppressed [ 814.223472] protocol 88fb is buggy, dev hsr_slave_0 [ 814.233669] protocol 88fb is buggy, dev hsr_slave_1 [ 814.289781] hfsplus: gid requires an argument [ 814.305532] hfsplus: unable to parse mount options [ 814.375573] gfs2: not a GFS2 filesystem 13:21:29 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x7ff, 0x3f, 0x20, 0x6, 0x0, 0x7, 0x4c2, 0x0, 0x7f, 0xffffffff, 0x0, 0xeb7, 0x800, 0xffffffffffffda30, 0x259, 0x5f, 0x3, 0x0, 0x8, 0x1, 0x7ff, 0x4, 0x4, 0x2, 0x800, 0x7, 0x150, 0x3f, 0x4602, 0xfffffffffffffbff, 0x4, 0x7, 0x1, 0x2, 0x5, 0x7fff, 0x0, 0x8, 0x6, @perf_config_ext={0x2, 0x1}, 0x21a40, 0x2, 0xd76, 0x7, 0x2, 0x8001, 0x2}, r1, 0x8, 0xffffffffffffffff, 0x8) 13:21:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x318, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 814.425208] gfs2: not a GFS2 filesystem 13:21:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xf8030000, 0x0, 0x0, 0x0, 0x0) [ 814.543395] protocol 88fb is buggy, dev hsr_slave_0 [ 814.548497] protocol 88fb is buggy, dev hsr_slave_1 [ 814.553711] protocol 88fb is buggy, dev hsr_slave_0 [ 814.558796] protocol 88fb is buggy, dev hsr_slave_1 13:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) pread64(r0, &(0x7f00000000c0)=""/24, 0x18, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="18000000030000000000000000000000bf3b0800ffffffff180000000300000000000000ffffff7f18150000", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000000000457016000000010000006d65aff7b56fc8bb8eb7fc75f0590000ae2e3670846441671c1fac621785132994f618adce54eb87beebbd97818b3dd7f41ff964194ac9303155ee48e227c8477a485305492192237c1ff770398a9694d303d93c5a854ce69658005f299a603a86b4e6a5d068b4071d6a8851ea0f4d314404639c328e96"], &(0x7f0000000140)='syzkaller\x00', 0xc7, 0x0, 0x0, 0x41000, 0x1, [], r2, 0xd}, 0x48) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000700)=""/4096) 13:21:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x319, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 814.614024] hfsplus: gid requires an argument [ 814.624280] hfsplus: unable to parse mount options 13:21:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 814.712891] hfsplus: gid requires an argument [ 814.717668] hfsplus: unable to parse mount options 13:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7fffffe, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000000000000000) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x2) 13:21:30 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 814.803665] gfs2: not a GFS2 filesystem 13:21:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 814.860043] gfs2: not a GFS2 filesystem 13:21:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0xa000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfa030000, 0x0, 0x0, 0x0, 0x0) 13:21:30 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0x100) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 815.049032] hfsplus: gid requires an argument [ 815.080254] ebt_limit_mt_check: 22 callbacks suppressed [ 815.080264] ebt_limit: overflow, try lower: 2147483647/65537 [ 815.082007] hfsplus: unable to parse mount options [ 815.116037] ebt_limit: overflow, try lower: 2147483647/65537 13:21:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x330, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x20000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x189400, 0x0) 13:21:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 815.220481] gfs2: not a GFS2 filesystem [ 815.230416] hfsplus: gid requires an argument [ 815.243455] hfsplus: unable to parse mount options 13:21:30 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, 0x0) [ 815.343381] protocol 88fb is buggy, dev hsr_slave_0 [ 815.348507] protocol 88fb is buggy, dev hsr_slave_1 [ 815.359697] ebt_limit: overflow, try lower: 2147483647/65537 13:21:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:30 executing program 2: r0 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x331, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 815.439256] gfs2: not a GFS2 filesystem 13:21:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 815.530462] gfs2: not a GFS2 filesystem [ 815.538373] hfsplus: gid requires an argument [ 815.542899] hfsplus: unable to parse mount options [ 815.545709] ebt_limit: overflow, try lower: 2147483647/65537 13:21:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x40000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) 13:21:30 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101400, 0x0) r1 = syz_open_pts(r0, 0xa8000) perf_event_open(&(0x7f0000000180)={0x2, 0xfffffffffffffccb, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$eventfd(r0, &(0x7f0000000200)=0x6, 0x8) r2 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) write$P9_RLOCK(r2, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8) io_setup(0x8, &(0x7f0000000000)=0x0) socket$inet6(0xa, 0x8000f, 0x80000000) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="06fbc3a06462958cbce79993ed39bf978d80db72b9", 0x15, 0x6, 0x0, 0x0, r0}, &(0x7f0000000140)) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$netlink(r2, 0x10e, 0x7, &(0x7f0000000340)=""/199, &(0x7f0000000440)=0xc7) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) [ 815.628595] hfsplus: gid requires an argument [ 815.633150] hfsplus: unable to parse mount options [ 815.663436] protocol 88fb is buggy, dev hsr_slave_0 [ 815.668561] protocol 88fb is buggy, dev hsr_slave_1 13:21:30 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x332, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 815.690799] ebt_limit: overflow, try lower: 2147483647/65537 13:21:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x48000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 815.829707] hfsplus: gid requires an argument [ 815.845807] hfsplus: unable to parse mount options [ 815.873508] gfs2: not a GFS2 filesystem 13:21:31 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x8, 0x200800) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 815.932022] ebt_limit: overflow, try lower: 2147483647/65537 13:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4c000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 815.981939] gfs2: not a GFS2 filesystem 13:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x333, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:31 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, 0x0) [ 816.059733] ebt_limit: overflow, try lower: 2147483647/65537 13:21:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x31f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x60000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 816.146939] hfsplus: gid requires an argument [ 816.151478] hfsplus: unable to parse mount options 13:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x334, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0xd0, 0x0, [0x0, 0x0]}) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000200)=""/195) [ 816.230055] hfsplus: gid requires an argument [ 816.236863] gfs2: not a GFS2 filesystem [ 816.253435] hfsplus: unable to parse mount options [ 816.286465] gfs2: not a GFS2 filesystem [ 816.295716] ebt_limit: overflow, try lower: 2147483647/65537 13:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x68000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:31 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 13:21:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x320, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x335, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 816.428958] ebt_limit: overflow, try lower: 2147483647/65537 13:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6c000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 816.514179] hfsplus: gid requires an argument [ 816.520022] hfsplus: unable to parse mount options [ 816.542709] gfs2: not a GFS2 filesystem 13:21:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x321, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 816.646302] ebt_limit: overflow, try lower: 2147483647/65537 [ 816.679460] hfsplus: gid requires an argument 13:21:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@sco, &(0x7f0000000140)=0x80, 0x800) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10800201}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="b0000000180001082abd7000ffdbdf250700000066a438da4b553ec09c2e681ef6b601a38ffb1ca94eb16af268567e26ec39f8eed51e79853448179f65a9755929a9e5f0a675ca5fdd82a5ea56526912fde59621708d17cc2fdf2d2c62bfde9d60f692b4e558c10a844f58f8cc12bce0bc8c92b58eb290e0f86db3fca2e82c806bcda7faac5db139407e886b5e8433ef4bf32d7c0c6ef1057a0913f18b32afd83953c196fda30d993c49b04b4296b4c0bb00"], 0xb0}, 0x1, 0x0, 0x0, 0x804}, 0x40040) r1 = socket$inet6(0xa, 0x3, 0x42) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2}, 0x36d) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x3ff, 0x10000) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000040)) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000040)=0x1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x802, 0x0) 13:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x74000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, 0x0) [ 816.693525] hfsplus: unable to parse mount options 13:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x336, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:31 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7a000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 816.792605] gfs2: not a GFS2 filesystem 13:21:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x322, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x337, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0xfeffff07, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 816.876801] gfs2: not a GFS2 filesystem [ 816.885576] hfsplus: gid requires an argument [ 816.906607] hfsplus: unable to parse mount options 13:21:32 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) 13:21:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x323, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 817.004872] hfsplus: gid requires an argument [ 817.009414] hfsplus: unable to parse mount options 13:21:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 817.089062] gfs2: not a GFS2 filesystem [ 817.171324] gfs2: not a GFS2 filesystem 13:21:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80100, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x4) 13:21:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x338, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:32 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x324, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:32 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x0, 0x0) [ 817.708888] __nla_parse: 29 callbacks suppressed [ 817.708899] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 817.739806] hfsplus: gid requires an argument [ 817.744789] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 817.772129] gfs2: not a GFS2 filesystem [ 817.776341] hfsplus: unable to parse mount options 13:21:33 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) getpeername$netrom(r1, &(0x7f00000002c0)={{0x3, @default}, [@netrom, @rose, @default, @netrom, @netrom, @default, @remote, @rose]}, &(0x7f0000000340)=0x7377166) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000100)=0x1, &(0x7f0000000140)=0x2) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x0) 13:21:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x325, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x339, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x0, 0x0) [ 817.933264] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 817.976465] hfsplus: gid requires an argument [ 817.982918] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 817.991831] hfsplus: unable to parse mount options 13:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:33 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf37000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x34a}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x8, 0x4) sendto$rxrpc(r1, &(0x7f0000000040)="b000bfaf5c3e285689d6a64f68cd2bb5a1c6740d0c1397f2dc2cf3954932cc6c5b5f46a4fdb1e7ce70364019a9c683e167888390cff77779f425767afa65d4f6c25680082f95eddb4c6377faf350d3d1471e73e0692d90a12d8ce0c55ffb30b99e5aac1c051d435eba", 0x69, 0x4001, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @multicast2}}, 0x24) socket$inet6_tcp(0xa, 0x1, 0x0) 13:21:33 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 818.076706] gfs2: not a GFS2 filesystem 13:21:33 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x400802) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000240)) ioprio_set$uid(0x3, r2, 0x2) 13:21:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x326, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 818.125714] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) 13:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 818.276646] hfsplus: gid requires an argument [ 818.283468] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 818.290051] hfsplus: unable to parse mount options [ 818.312282] gfs2: not a GFS2 filesystem [ 818.317539] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x327, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x202000, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000200)=""/4096, &(0x7f0000000080)=0x1000) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 818.436234] hfsplus: gid requires an argument [ 818.445870] gfs2: not a GFS2 filesystem [ 818.456219] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 818.465986] hfsplus: unable to parse mount options 13:21:33 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 13:21:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x101161970, 0x0, 0x0, 0x0, 0x0) 13:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 818.554953] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x328, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xff, 0x20000) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000080)={0x3ff, 0xc96, 0x6, 0x9, 0x40, 0x24, 0x21, "a63a2558d8ec54dbf5ae93ef818f074ca4f6a903", "843b89e42e7af6519480e6bad3ca0648196f8675"}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 818.637055] gfs2: not a GFS2 filesystem [ 818.645296] hfsplus: gid requires an argument [ 818.656945] hfsplus: unable to parse mount options 13:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 818.679392] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x329, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 818.762530] hfsplus: gid requires an argument [ 818.769946] hfsplus: unable to parse mount options [ 818.788497] gfs2: not a GFS2 filesystem 13:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) 13:21:34 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:34 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffff, 0x400) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000080)={0x69, "a8fdb2eeb968d5720c478fdc4b424fe0d8202845732db4d21704723caa20670c", 0x2, 0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x101000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r1, &(0x7f0000000240)="3d77bcce13799381349e868082ea123bc332e699125d23bbc749b6c417bea074f1142813ff890ccc29c7afa5e29001fa585a6fa64382d63d905463d7cbcdb07dd275d1b030b45cf037b23d86cfe4e0515d49b5814397d690c14444defd09880438d968f6f797d164e2ad910d483cae31d06aa7e688aed14242c9ee8d4ce8eb", &(0x7f00000002c0)=""/91}, 0x18) 13:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4800000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 819.025444] hfsplus: gid requires an argument [ 819.046004] hfsplus: unable to parse mount options 13:21:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f00000000c0)={0x8, 0x100, @value=0x2}) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="023bff581db729d1a493a14bd2415abffb35900264d29dbb2cf30b3b4ab4cfcd29ee5db4cd53a0f204ef36b4d7ac22c1db76fc18f57ca244ac"], 0x13, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x4, [0x401, 0x3ff, 0x6, 0x6, 0x7, 0x7f, 0x5, 0x7fff, 0x1ff, 0x0, 0x0, 0x43, 0x9, 0x6d91, 0x9fb, 0x4, 0x3, 0x0, 0x7, 0x3f, 0x4, 0x5, 0x10001, 0x8, 0x7, 0x3, 0x100000000, 0xf07, 0x1d, 0x3ff, 0x80000000, 0x8, 0x8, 0x1000, 0x2, 0x264, 0x6, 0x1000, 0x100, 0xc81e, 0x3, 0x40, 0x8, 0x9, 0x5, 0xffffffff, 0x5, 0x7], 0x6}) 13:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x340, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 819.151710] hfsplus: gid requires an argument [ 819.156666] gfs2: not a GFS2 filesystem [ 819.161282] hfsplus: unable to parse mount options 13:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:34 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 819.269062] gfs2: not a GFS2 filesystem 13:21:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, 0x0) 13:21:34 executing program 2: getresgid(0x0, 0x0, &(0x7f00000002c0)) getgroups(0x3, &(0x7f0000000100)=[0xffffffffffffffff, 0xee00, 0xee01]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x20, 0x4040) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x9, 0x81, 0x0, 0x0, 0x0, 0xd15916a5748a52ca, "ad591cae620ac6c99820a5120bb805d3f3c1f63dd1b62a4d1f0e30a19320536100f9137bd61a18addcd740c3fa8aa7ec2910e09ab675d360f9e90007a1d09e0d", "9a7d39685b996c463779f8596a788d47f63b5329bc1559c17b81539349e53756c44bf46698acfa817326d41c8de4797fa4ef4712b63940805e611cfd4df31a63", "55663962f3140d20b58bacbd5a11f20f747cde922589a208b79b776f431ab3da", [0x3, 0x1ca7]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000a40)=[{0x0}, {&(0x7f0000000700)=""/209, 0xd1}, {0x0}], 0x3, &(0x7f0000000ac0)=""/136, 0x88}, 0x7}], 0x2, 0x40000000, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000540)=""/7, 0x7, 0x40000061, &(0x7f0000000580)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f00000007c0)='nbd\x00') syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x101000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000005c0)={0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000640)={r2, @in={{0x2, 0x4e23, @remote}}, 0x2, 0x81, 0x9, 0x3, 0x74}, 0x98) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') prctl$PR_GET_KEEPCAPS(0x7) 13:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6800000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x341, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 819.477146] hfsplus: gid requires an argument [ 819.482034] gfs2: not a GFS2 filesystem [ 819.504028] net_ratelimit: 20 callbacks suppressed [ 819.504076] protocol 88fb is buggy, dev hsr_slave_0 [ 819.515036] protocol 88fb is buggy, dev hsr_slave_1 13:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 819.525392] hfsplus: unable to parse mount options [ 819.552227] gfs2: not a GFS2 filesystem 13:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x342, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7400000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 819.680149] hfsplus: gid requires an argument [ 819.706323] hfsplus: unable to parse mount options 13:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 819.757262] gfs2: not a GFS2 filesystem 13:21:34 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x343, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 819.814982] gfs2: not a GFS2 filesystem [ 819.823396] protocol 88fb is buggy, dev hsr_slave_0 [ 819.828535] protocol 88fb is buggy, dev hsr_slave_1 [ 819.833747] protocol 88fb is buggy, dev hsr_slave_0 [ 819.838820] protocol 88fb is buggy, dev hsr_slave_1 [ 819.937756] hfsplus: gid requires an argument [ 819.954445] hfsplus: unable to parse mount options [ 820.093926] hfsplus: gid requires an argument [ 820.098438] hfsplus: unable to parse mount options 13:21:35 executing program 2: getresgid(0x0, 0x0, &(0x7f00000002c0)) getgroups(0x3, &(0x7f0000000100)=[0xffffffffffffffff, 0xee00, 0xee01]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x20, 0x4040) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x9, 0x81, 0x0, 0x0, 0x0, 0xd15916a5748a52ca, "ad591cae620ac6c99820a5120bb805d3f3c1f63dd1b62a4d1f0e30a19320536100f9137bd61a18addcd740c3fa8aa7ec2910e09ab675d360f9e90007a1d09e0d", "9a7d39685b996c463779f8596a788d47f63b5329bc1559c17b81539349e53756c44bf46698acfa817326d41c8de4797fa4ef4712b63940805e611cfd4df31a63", "55663962f3140d20b58bacbd5a11f20f747cde922589a208b79b776f431ab3da", [0x3, 0x1ca7]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000a40)=[{0x0}, {&(0x7f0000000700)=""/209, 0xd1}, {0x0}], 0x3, &(0x7f0000000ac0)=""/136, 0x88}, 0x7}], 0x2, 0x40000000, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) getresgid(&(0x7f0000000000), 0x0, &(0x7f0000000080)) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000540)=""/7, 0x7, 0x40000061, &(0x7f0000000580)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f00000007c0)='nbd\x00') syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x101000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000005c0)={0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000640)={r2, @in={{0x2, 0x4e23, @remote}}, 0x2, 0x81, 0x9, 0x3, 0x74}, 0x98) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') prctl$PR_GET_KEEPCAPS(0x7) 13:21:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x7a00000000000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x32f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x344, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:35 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 820.276472] hfsplus: gid requires an argument [ 820.287339] gfs2: not a GFS2 filesystem [ 820.291990] ebt_limit_mt_check: 21 callbacks suppressed [ 820.291997] ebt_limit: overflow, try lower: 2147483647/65537 [ 820.292857] hfsplus: unable to parse mount options 13:21:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x330, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0xfeffff0700000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 820.378845] gfs2: not a GFS2 filesystem [ 820.392551] hfsplus: gid requires an argument 13:21:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x345, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 820.429211] hfsplus: unable to parse mount options 13:21:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, 0x0) [ 820.463411] protocol 88fb is buggy, dev hsr_slave_0 [ 820.468529] protocol 88fb is buggy, dev hsr_slave_1 [ 820.539392] ebt_limit: overflow, try lower: 2147483647/65537 13:21:35 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x331, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 820.620267] gfs2: not a GFS2 filesystem [ 820.745307] hfsplus: gid requires an argument [ 820.751245] gfs2: not a GFS2 filesystem [ 820.761279] hfsplus: unable to parse mount options [ 820.783406] protocol 88fb is buggy, dev hsr_slave_0 [ 820.788558] protocol 88fb is buggy, dev hsr_slave_1 13:21:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) dup3(r0, r1, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) 13:21:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x346, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x332, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 820.877566] hfsplus: gid requires an argument [ 820.893816] hfsplus: unable to parse mount options [ 820.941451] ebt_limit: overflow, try lower: 2147483647/65537 [ 820.974379] gfs2: not a GFS2 filesystem 13:21:36 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x2, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x333, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 821.043991] gfs2: not a GFS2 filesystem 13:21:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x347, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x10000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:36 executing program 2: getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000400)=""/4096, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) [ 821.111383] ebt_limit: overflow, try lower: 2147483647/65537 [ 821.119240] hfsplus: gid requires an argument [ 821.145530] hfsplus: unable to parse mount options 13:21:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x3, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x348, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 821.231180] gfs2: not a GFS2 filesystem [ 821.238695] hfsplus: gid requires an argument [ 821.243207] hfsplus: unable to parse mount options 13:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x334, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x9}]}, 0x0, 0xfffffefffffffffd, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 821.276307] ebt_limit: overflow, try lower: 2147483647/65537 13:21:36 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 821.345048] gfs2: not a GFS2 filesystem 13:21:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x349, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100), 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000003c0)={'eql\x00', 0x200}) r3 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xd3, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x4000000000839a) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r4}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r3, 0x0, 0x43, &(0x7f0000000500)='selinuxmd5summd5sumkeyringsecurity#\'systemposix_acl_access\'GPLeth0\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x1, 0x9, 0x7, 0x0, 0x3e5c, 0x0, 0x4, 0xf7d4, 0x2, 0x7, 0x151, 0x95ed, 0x1, 0x2, 0x9, 0x1, 0x2777, 0x1, 0x7fffffff, 0x40, 0x0, 0x2, 0x80000000, 0xfffffffffffffff7, 0x8, 0xcf, 0x7fffffff, 0x1, 0x1, 0xffff, 0x9, 0x3f, 0x9, 0x7fffffff, 0x7ff, 0x0, 0xfffffffffffffff8, 0x2, @perf_config_ext={0xefb, 0xfffffffffffffff8}, 0x0, 0x5, 0x8, 0x3, 0x9, 0x4, 0x5}, r5, 0x9, r4, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x70, 0x3, 0x9, 0x1, 0x10001, 0x0, 0xfffffffffffffff9, 0x200, 0x8, 0x2c, 0x5, 0x0, 0x9, 0x9ab, 0x4, 0x2, 0x6900000, 0x1ff, 0x4, 0x86f2, 0x4fbdab61, 0x1ff, 0x3, 0x2e, 0xfe93, 0x2, 0x100, 0x5, 0x8000, 0x0, 0x2, 0x1000, 0x0, 0x7f, 0x0, 0x0, 0x83, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xf}, 0x2000, 0x4, 0x7, 0xb, 0x0, 0x9, 0x1ff}, r0, 0xc, 0xffffffffffffffff, 0x2) openat$cgroup_type(r0, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000380)=0x8001, 0x4) 13:21:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, 0x0) [ 821.430334] ebt_limit: overflow, try lower: 2147483647/65537 [ 821.459444] hfsplus: gid requires an argument [ 821.465978] hfsplus: unable to parse mount options 13:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x335, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x5, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 821.559533] hfsplus: gid requires an argument [ 821.566947] gfs2: not a GFS2 filesystem [ 821.575656] hfsplus: unable to parse mount options [ 821.606541] gfs2: not a GFS2 filesystem 13:21:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 821.628784] ebt_limit: overflow, try lower: 2147483647/65537 13:21:36 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x336, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 821.815603] hfsplus: gid requires an argument [ 821.821062] hfsplus: unable to parse mount options 13:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x337, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 821.927462] ebt_limit: overflow, try lower: 2147483647/65537 [ 821.939007] hfsplus: gid requires an argument [ 821.943940] gfs2: not a GFS2 filesystem [ 821.948682] hfsplus: unable to parse mount options 13:21:37 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000600)='./file0//ile0\x00') open(&(0x7f0000000040)='./file0//ile0\x00', 0x803fe, 0x0) 13:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x7, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 822.053619] gfs2: not a GFS2 filesystem 13:21:37 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:37 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000500)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2000000000002e, 0x0, 0x0) [ 822.105458] ebt_limit: overflow, try lower: 2147483647/65537 13:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0xa, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x338, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 822.227657] hfsplus: gid requires an argument [ 822.256907] hfsplus: unable to parse mount options [ 822.268089] ebt_limit: overflow, try lower: 2147483647/65537 13:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x48, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 822.315425] gfs2: not a GFS2 filesystem [ 822.329662] hfsplus: gid requires an argument [ 822.337255] hfsplus: unable to parse mount options 13:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x339, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 822.374132] gfs2: not a GFS2 filesystem 13:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4c, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:37 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:37 executing program 2: 13:21:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x60, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:37 executing program 2: [ 822.603786] hfsplus: gid requires an argument [ 822.608312] hfsplus: unable to parse mount options [ 822.610147] gfs2: not a GFS2 filesystem 13:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x68, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 822.744159] hfsplus: gid requires an argument [ 822.748680] hfsplus: unable to parse mount options [ 822.773123] gfs2: not a GFS2 filesystem 13:21:37 executing program 2: 13:21:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) [ 822.825822] __nla_parse: 38 callbacks suppressed [ 822.825831] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:38 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:38 executing program 2: [ 822.908673] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x350, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 822.964374] gfs2: not a GFS2 filesystem 13:21:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6c, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:38 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) pread64(r0, 0x0, 0x0, 0x0) [ 823.054054] gfs2: not a GFS2 filesystem 13:21:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x74, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 823.102710] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 823.126278] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f855e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f80208f0f1bcc885c8ba93c0043cfce64a425f01c00", "7b3177f4fc2eb04172daa8fdd1c4c4cf144a23173b6605afb988de7e07195d78f7ddd1000000000000000020000000000000000100", "ee52c00d1e76a943477b289930671137c4000000009dff03002000"}) 13:21:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x351, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 823.238669] gfs2: not a GFS2 filesystem 13:21:38 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x7a, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 823.316898] gfs2: not a GFS2 filesystem 13:21:38 executing program 2: 13:21:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 823.337913] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x352, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:38 executing program 2: 13:21:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x300, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 823.475907] hfsplus: gid requires an argument [ 823.481178] hfsplus: unable to parse mount options [ 823.505340] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 823.568373] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 823.605925] hfsplus: gid requires an argument [ 823.610429] hfsplus: unable to parse mount options 13:21:38 executing program 2: [ 823.648455] gfs2: not a GFS2 filesystem 13:21:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x500, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x353, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:38 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 823.706523] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 823.773135] gfs2: not a GFS2 filesystem 13:21:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x33f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:39 executing program 2: 13:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x600, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 823.821669] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:39 executing program 2: 13:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x700, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x354, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 823.966168] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 824.050636] gfs2: not a GFS2 filesystem 13:21:39 executing program 2: 13:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0xa00, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x340, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:39 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x355, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:39 executing program 2: [ 824.254360] gfs2: not a GFS2 filesystem 13:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x2000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x341, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:39 executing program 2: 13:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x3f00, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:39 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x356, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x342, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 824.569467] gfs2: not a GFS2 filesystem 13:21:39 executing program 2: [ 824.623457] net_ratelimit: 20 callbacks suppressed [ 824.623465] protocol 88fb is buggy, dev hsr_slave_0 [ 824.633581] protocol 88fb is buggy, dev hsr_slave_1 [ 824.641907] gfs2: not a GFS2 filesystem 13:21:39 executing program 2: 13:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4800, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:39 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x343, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x357, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4c00, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:40 executing program 2: [ 824.863368] gfs2: not a GFS2 filesystem [ 824.909679] gfs2: not a GFS2 filesystem [ 824.943433] protocol 88fb is buggy, dev hsr_slave_0 [ 824.948575] protocol 88fb is buggy, dev hsr_slave_1 [ 824.953792] protocol 88fb is buggy, dev hsr_slave_0 [ 824.958863] protocol 88fb is buggy, dev hsr_slave_1 13:21:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x344, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:40 executing program 2: 13:21:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x358, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:40 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xfc', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6800, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 825.164965] gfs2: not a GFS2 filesystem 13:21:40 executing program 2: 13:21:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x345, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x359, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6c00, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 825.300307] gfs2: not a GFS2 filesystem 13:21:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:40 executing program 2: 13:21:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x346, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 825.451346] ebt_limit_mt_check: 21 callbacks suppressed [ 825.451355] ebt_limit: overflow, try lower: 2147483647/65537 13:21:40 executing program 2: 13:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x7400, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:40 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xfd', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 825.573498] gfs2: not a GFS2 filesystem 13:21:40 executing program 2: [ 825.618141] ebt_limit: overflow, try lower: 2147483647/65537 [ 825.624488] gfs2: not a GFS2 filesystem 13:21:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x7a00, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, 0x0) [ 825.743422] protocol 88fb is buggy, dev hsr_slave_0 [ 825.748646] protocol 88fb is buggy, dev hsr_slave_1 13:21:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x347, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:40 executing program 2: [ 825.793707] ebt_limit: overflow, try lower: 2147483647/65537 13:21:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x1000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 825.897428] gfs2: not a GFS2 filesystem 13:21:41 executing program 2: 13:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x348, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:41 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x7f', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 826.015749] gfs2: not a GFS2 filesystem 13:21:41 executing program 2: [ 826.040636] ebt_limit: overflow, try lower: 2147483647/65537 [ 826.063483] protocol 88fb is buggy, dev hsr_slave_0 [ 826.068635] protocol 88fb is buggy, dev hsr_slave_1 13:21:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x2000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x349, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:41 executing program 2: [ 826.291643] gfs2: not a GFS2 filesystem [ 826.292703] ebt_limit: overflow, try lower: 2147483647/65537 13:21:41 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x8c', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 826.380984] gfs2: not a GFS2 filesystem 13:21:41 executing program 2: 13:21:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x3000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1002000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:41 executing program 2: [ 826.550357] ebt_limit: overflow, try lower: 2147483647/65537 13:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:41 executing program 2: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = memfd_create(&(0x7f0000000340)='*vmnet1em1+ppp0eth0\x00', 0x6) accept4$unix(r3, &(0x7f00000003c0), 0x0, 0x800) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x3, 0x7}, @mss={0x2, 0x6}, @mss], 0x3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1d, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f00000001c0)=@sr0='/dev/sr0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='coda\x00', 0x20000, &(0x7f0000000380)='cramfs\x00') mount(&(0x7f0000000480)=ANY=[@ANYBLOB="4c5b52faf204b0f04a1078e4c38f414ad227a8a363e6e157c6479296aa4a561c598a5e0aea2e226e5db77b155645e7d28c544f414a02969c098d2cea230557a389029265e77265dc78296aca9d12a899a0e6a1ef079182cfad50e943d1a9c90d8233aecff030b953d4f07ba5cf71031ef63a1eefd9fff03010f7626daeae061d8b6779d9958eee9fe6b0f5a6cb7a508a39c858325856ea"], 0x0, &(0x7f00000000c0)='cramfs\x00', 0x11002, &(0x7f0000000100)='v\x00\x01\xb0v') write(r6, &(0x7f00000001c0), 0xfffffef3) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) fcntl$notify(0xffffffffffffffff, 0x402, 0x5) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, 0x0) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_OFF(r4, 0x7002) 13:21:41 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xeb', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 826.636142] gfs2: not a GFS2 filesystem 13:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 826.741431] ebt_limit: overflow, try lower: 2147483647/65537 13:21:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1401000000000000, 0x0, 0x0, 0x0, 0x0) [ 826.790264] ebt_limit: overflow, try lower: 2147483647/65537 13:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x360, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x5000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 826.927688] gfs2: not a GFS2 filesystem 13:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:42 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\xf6', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 826.996120] ebt_limit: overflow, try lower: 2147483647/65537 [ 827.034892] gfs2: not a GFS2 filesystem 13:21:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1b0f000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x361, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x800000004) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 827.243901] ebt_limit: overflow, try lower: 2147483647/65537 [ 827.261053] gfs2: not a GFS2 filesystem 13:21:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x7000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x362, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 827.349670] gfs2: not a GFS2 filesystem 13:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:42 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x109400, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@loopback, 0x0, r1}) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 13:21:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x7fffffe, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 827.555292] hfsplus: gid requires an argument 13:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x363, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x34f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 827.577288] hfsplus: unable to parse mount options [ 827.648635] hfsplus: gid requires an argument [ 827.653169] hfsplus: unable to parse mount options 13:21:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0xa000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 827.699500] gfs2: not a GFS2 filesystem 13:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x364, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:42 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 827.801677] gfs2: not a GFS2 filesystem 13:21:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x20000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x350, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 827.851132] __nla_parse: 32 callbacks suppressed [ 827.851144] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) [ 827.942982] hfsplus: gid requires an argument [ 827.974129] hfsplus: unable to parse mount options 13:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x365, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 828.010184] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 828.092129] hfsplus: gid requires an argument [ 828.098036] hfsplus: unable to parse mount options [ 828.123165] gfs2: not a GFS2 filesystem 13:21:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 828.146145] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x109400, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@loopback, 0x0, r1}) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 13:21:43 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x351, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 828.223472] gfs2: not a GFS2 filesystem 13:21:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x366, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 828.288845] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 828.327500] hfsplus: gid requires an argument 13:21:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x40000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 828.355042] hfsplus: unable to parse mount options 13:21:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x352, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 828.410187] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 828.470515] gfs2: not a GFS2 filesystem 13:21:43 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x48000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x367, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 828.520254] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 828.540120] gfs2: not a GFS2 filesystem 13:21:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, 0x0) [ 828.672870] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x353, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 828.728443] hfsplus: gid requires an argument [ 828.765857] hfsplus: unable to parse mount options [ 828.784078] gfs2: not a GFS2 filesystem [ 828.819950] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 13:21:44 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@loopback, @remote, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@mcast2, @loopback, @ipv4, 0x0, 0x0, 0x0, 0x100, 0x0, 0xe3166426b1e03558, r1}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={@local, @loopback}) 13:21:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4c000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x368, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 828.869235] hfsplus: gid requires an argument [ 828.879442] hfsplus: unable to parse mount options [ 828.890998] gfs2: not a GFS2 filesystem 13:21:44 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2803000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x354, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 828.977912] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x60000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:44 executing program 2: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d9345) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 13:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x369, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x68000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 829.128760] gfs2: not a GFS2 filesystem [ 829.131424] hfsplus: gid requires an argument [ 829.142669] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 829.153228] hfsplus: unable to parse mount options 13:21:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x355, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 829.260778] hfsplus: gid requires an argument 13:21:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x0, 0x0) [ 829.281696] hfsplus: unable to parse mount options 13:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x36a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6c000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:44 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x356, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 829.467155] gfs2: not a GFS2 filesystem 13:21:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x74000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x36b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 829.539806] gfs2: not a GFS2 filesystem 13:21:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3402000000000000, 0x0, 0x0, 0x0, 0x0) [ 829.608006] hfsplus: gid requires an argument [ 829.651141] hfsplus: unable to parse mount options [ 829.731082] hfsplus: gid requires an argument [ 829.738959] hfsplus: unable to parse mount options [ 829.746986] gfs2: not a GFS2 filesystem [ 829.829002] gfs2: not a GFS2 filesystem [ 829.903399] net_ratelimit: 20 callbacks suppressed [ 829.903407] protocol 88fb is buggy, dev hsr_slave_0 [ 829.913467] protocol 88fb is buggy, dev hsr_slave_1 [ 830.223459] protocol 88fb is buggy, dev hsr_slave_0 [ 830.228603] protocol 88fb is buggy, dev hsr_slave_1 [ 830.233784] protocol 88fb is buggy, dev hsr_slave_0 [ 830.238868] protocol 88fb is buggy, dev hsr_slave_1 13:21:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffb, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="560ceb31dbd18923c6b41acfbe557dfb246d379b15b1f14960ae22ea1631614ca42c2d088888a4e077486beec89e74e69bf6515080f7cb6c1336164858bef67b8b4d3003e8f022753bbd5eb9a453c1bb2bbdcfd428553360e73e8ff4329ca6bbd65f6aa2ca8628c7ac1f03750f06f2edf4d4db44ac4471d3ab34aed66602c48e4ce3bf8e63692da757425e9c4d2f82f19e1a8f1c1322bcc59bf717f3272700cc1f06056ede44570ac43539aa19a1e36ee701214f9166706fae7587b79fdcf9851902aab80f40c95c9b252d30", 0xcc, 0x401}, {&(0x7f0000000300)="809d3a1814c8e235029c04da086409ae4782f3cda9e2d8db089440d367723dc40df3e5043e1949dee85ee2504f9824fb5cc9f3495417e27e9001a9077a5801cc237d8a6b1cbd140c66ec98a8224691daa6ea3135b35d29fd9ce6651cfcf0a76ab6b6b76c2f60f102a191e08420ddf179ec318af23855e04459acb4bdc51c000e8d9d416f60940f67ea4a7d87cbc1245ea927c80a28b105b0869172eaca1b577e30a52941e459a6dfa5bf070de407e3104e5ebb2618b1ccfbce8a294afde97df7bcb745389e8a59", 0xc7, 0x6}], 0x102080, &(0x7f0000000140)='\\bdev.mime_type\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/30) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005540)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000005580)={0x1d, r2}, 0x10) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000480)='ceph\x00', 0x5) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000400)) 13:21:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x7a000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x357, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x36c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:45 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) [ 830.383392] gfs2: not a GFS2 filesystem 13:21:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x36d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0xfeffff07, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 830.414346] hfsplus: gid requires an argument [ 830.420109] hfsplus: unable to parse mount options 13:21:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x358, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) [ 830.531238] hfsplus: gid requires an argument [ 830.551297] hfsplus: unable to parse mount options [ 830.595803] ebt_limit_mt_check: 13 callbacks suppressed [ 830.595813] ebt_limit: overflow, try lower: 2147483647/65537 13:21:45 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffb, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="560ceb31dbd18923c6b41acfbe557dfb246d379b15b1f14960ae22ea1631614ca42c2d088888a4e077486beec89e74e69bf6515080f7cb6c1336164858bef67b8b4d3003e8f022753bbd5eb9a453c1bb2bbdcfd428553360e73e8ff4329ca6bbd65f6aa2ca8628c7ac1f03750f06f2edf4d4db44ac4471d3ab34aed66602c48e4ce3bf8e63692da757425e9c4d2f82f19e1a8f1c1322bcc59bf717f3272700cc1f06056ede44570ac43539aa19a1e36ee701214f9166706fae7587b79fdcf9851902aab80f40c95c9b252d30", 0xcc, 0x401}, {&(0x7f0000000300)="809d3a1814c8e235029c04da086409ae4782f3cda9e2d8db089440d367723dc40df3e5043e1949dee85ee2504f9824fb5cc9f3495417e27e9001a9077a5801cc237d8a6b1cbd140c66ec98a8224691daa6ea3135b35d29fd9ce6651cfcf0a76ab6b6b76c2f60f102a191e08420ddf179ec318af23855e04459acb4bdc51c000e8d9d416f60940f67ea4a7d87cbc1245ea927c80a28b105b0869172eaca1b577e30a52941e459a6dfa5bf070de407e3104e5ebb2618b1ccfbce8a294afde97df7bcb745389e8a59", 0xc7, 0x6}], 0x102080, &(0x7f0000000140)='\\bdev.mime_type\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/30) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005540)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000005580)={0x1d, r2}, 0x10) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000480)='ceph\x00', 0x5) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000400)) 13:21:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x36e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x359, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 830.761081] gfs2: not a GFS2 filesystem [ 830.795875] ebt_limit: overflow, try lower: 2147483647/65537 13:21:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socket$inet(0x2, 0x80007, 0xff) 13:21:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x36f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 830.838652] hfsplus: gid requires an argument [ 830.856806] gfs2: not a GFS2 filesystem [ 830.861555] hfsplus: unable to parse mount options [ 830.866777] protocol 88fb is buggy, dev hsr_slave_0 [ 830.866849] protocol 88fb is buggy, dev hsr_slave_1 13:21:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35a, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 831.003751] hfsplus: gid requires an argument [ 831.008277] hfsplus: unable to parse mount options [ 831.035703] ebt_limit: overflow, try lower: 2147483647/65537 13:21:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x370, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:46 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 831.123845] gfs2: not a GFS2 filesystem 13:21:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35b, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 831.182961] ebt_limit: overflow, try lower: 2147483647/65537 [ 831.192151] gfs2: not a GFS2 filesystem [ 831.193380] protocol 88fb is buggy, dev hsr_slave_0 [ 831.201226] protocol 88fb is buggy, dev hsr_slave_1 13:21:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:46 executing program 2 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x6009, 0x0) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x371, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 831.258378] hfsplus: gid requires an argument [ 831.263174] hfsplus: unable to parse mount options [ 831.341741] hfsplus: gid requires an argument 13:21:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35c, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 831.368666] hfsplus: unable to parse mount options [ 831.384023] gfs2: not a GFS2 filesystem [ 831.408033] ebt_limit: overflow, try lower: 2147483647/65537 [ 831.444288] FAULT_INJECTION: forcing a failure. [ 831.444288] name failslab, interval 1, probability 0, space 0, times 0 [ 831.455937] CPU: 1 PID: 11419 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 831.463129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.472476] Call Trace: [ 831.472503] dump_stack+0x1db/0x2d0 [ 831.472530] ? dump_stack_print_info.cold+0x20/0x20 [ 831.483760] ? check_preemption_disabled+0x48/0x290 [ 831.488804] should_fail.cold+0xa/0x15 [ 831.492700] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 831.497823] ? ___might_sleep+0x1e7/0x310 [ 831.502025] ? arch_local_save_flags+0x50/0x50 [ 831.506686] ? __f_unlock_pos+0x19/0x20 [ 831.510677] __should_failslab+0x121/0x190 [ 831.514929] should_failslab+0x9/0x14 [ 831.518744] kmem_cache_alloc+0x2be/0x710 [ 831.522892] ? lock_downgrade+0x910/0x910 [ 831.527062] getname_flags+0xd6/0x5b0 [ 831.530872] getname+0x1a/0x20 [ 831.534079] kernel_quotactl+0x10c/0x1810 [ 831.538220] ? kasan_check_write+0x14/0x20 [ 831.542450] ? __mutex_unlock_slowpath+0x195/0x870 [ 831.547385] ? qtype_enforce_flag+0x80/0x80 [ 831.551705] ? wait_for_completion+0x810/0x810 [ 831.556287] ? check_preemption_disabled+0x48/0x290 [ 831.561311] ? __sb_end_write+0xd9/0x110 [ 831.565388] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 831.570917] ? fput+0x128/0x1a0 [ 831.574193] ? do_syscall_64+0x8c/0x800 [ 831.578165] ? do_syscall_64+0x8c/0x800 [ 831.582149] ? lockdep_hardirqs_on+0x415/0x5d0 [ 831.586735] ? trace_hardirqs_on+0xbd/0x310 [ 831.591052] ? __ia32_sys_read+0xb0/0xb0 [ 831.595161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.600530] ? trace_hardirqs_off_caller+0x300/0x300 [ 831.605639] __x64_sys_quotactl+0x97/0xf0 [ 831.609794] do_syscall_64+0x1a3/0x800 [ 831.613684] ? syscall_return_slowpath+0x5f0/0x5f0 [ 831.618631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 831.623652] ? __switch_to_asm+0x34/0x70 [ 831.627715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 831.632558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.637770] RIP: 0033:0x458099 [ 831.640978] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.659884] RSP: 002b:00007f531d53bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 831.667600] RAX: ffffffffffffffda RBX: 00007f531d53bc90 RCX: 0000000000458099 [ 831.674873] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000000 [ 831.682146] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 13:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x372, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 831.689416] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f531d53c6d4 [ 831.696707] R13: 00000000004c4c01 R14: 00000000004d8398 R15: 0000000000000003 [ 831.749114] gfs2: not a GFS2 filesystem [ 831.754899] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 831.765967] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 831.772751] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 13:21:46 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 831.793241] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 831.800257] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 831.802422] ebt_limit: overflow, try lower: 2147483647/65537 [ 831.821400] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 13:21:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, 0x0) [ 831.844599] UDF-fs: Scanning with blocksize 512 failed [ 831.859051] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 831.873644] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 831.881726] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 13:21:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x373, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 831.904129] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 831.911209] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 831.942586] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 831.949932] UDF-fs: Scanning with blocksize 1024 failed 13:21:47 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 831.976140] gfs2: not a GFS2 filesystem [ 831.986245] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 832.012344] ebt_limit: overflow, try lower: 2147483647/65537 13:21:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35d, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 832.022135] UDF-fs: Scanning with blocksize 2048 failed [ 832.031532] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 832.062155] UDF-fs: Scanning with blocksize 4096 failed 13:21:47 executing program 2 (fault-call:2 fault-nth:1): mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x6009, 0x0) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:21:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x374, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 832.127392] ebt_limit: overflow, try lower: 2147483647/65537 [ 832.143871] gfs2: not a GFS2 filesystem [ 832.166485] hfsplus: gid requires an argument [ 832.170987] hfsplus: unable to parse mount options 13:21:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6002000000000000, 0x0, 0x0, 0x0, 0x0) [ 832.247276] ebt_limit: overflow, try lower: 2147483647/65537 [ 832.277691] hfsplus: gid requires an argument [ 832.282203] hfsplus: unable to parse mount options [ 832.289636] FAULT_INJECTION: forcing a failure. [ 832.289636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 832.301442] CPU: 0 PID: 11458 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 832.308637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.317993] Call Trace: [ 832.320607] dump_stack+0x1db/0x2d0 [ 832.324249] ? dump_stack_print_info.cold+0x20/0x20 [ 832.329280] should_fail.cold+0xa/0x15 [ 832.333183] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.338291] ? __might_fault+0x12b/0x1e0 [ 832.342353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.347911] ? _parse_integer+0x139/0x190 [ 832.352086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.357634] ? _kstrtoull+0x17d/0x250 [ 832.357655] should_fail_alloc_page+0x50/0x60 [ 832.357670] __alloc_pages_nodemask+0x323/0xdc0 [ 832.365945] ? check_preemption_disabled+0x48/0x290 [ 832.365965] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 832.365979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.366013] ? ___might_sleep+0x1e7/0x310 [ 832.366030] ? trace_hardirqs_off+0xb8/0x310 [ 832.366049] cache_grow_begin+0x9c/0x8c0 [ 832.366062] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.366077] ? check_preemption_disabled+0x48/0x290 [ 832.366095] kmem_cache_alloc+0x645/0x710 [ 832.366116] getname_flags+0xd6/0x5b0 [ 832.417295] getname+0x1a/0x20 [ 832.420486] kernel_quotactl+0x10c/0x1810 [ 832.424642] ? kasan_check_write+0x14/0x20 [ 832.428899] ? __mutex_unlock_slowpath+0x195/0x870 [ 832.433841] ? qtype_enforce_flag+0x80/0x80 [ 832.438157] ? wait_for_completion+0x810/0x810 [ 832.442774] ? check_preemption_disabled+0x48/0x290 [ 832.447801] ? __sb_end_write+0xd9/0x110 [ 832.451893] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.457431] ? fput+0x128/0x1a0 [ 832.460716] ? do_syscall_64+0x8c/0x800 [ 832.464698] ? do_syscall_64+0x8c/0x800 [ 832.468674] ? lockdep_hardirqs_on+0x415/0x5d0 [ 832.473256] ? trace_hardirqs_on+0xbd/0x310 [ 832.477579] ? __ia32_sys_read+0xb0/0xb0 [ 832.481655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.487028] ? trace_hardirqs_off_caller+0x300/0x300 [ 832.492152] __x64_sys_quotactl+0x97/0xf0 [ 832.496309] do_syscall_64+0x1a3/0x800 [ 832.500199] ? syscall_return_slowpath+0x5f0/0x5f0 [ 832.505129] ? prepare_exit_to_usermode+0x232/0x3b0 [ 832.510158] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.515012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.520199] RIP: 0033:0x458099 [ 832.523386] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:21:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x375, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 832.542282] RSP: 002b:00007f531d55cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 832.549985] RAX: ffffffffffffffda RBX: 00007f531d55cc90 RCX: 0000000000458099 [ 832.557278] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000000 [ 832.564624] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 832.571912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f531d55d6d4 [ 832.579183] R13: 00000000004c4c01 R14: 00000000004d8398 R15: 0000000000000003 13:21:47 executing program 2 (fault-call:2 fault-nth:2): mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x6009, 0x0) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:21:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35e, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) 13:21:47 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 832.723459] gfs2: not a GFS2 filesystem 13:21:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x376, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 832.750954] ebt_limit: overflow, try lower: 2147483647/65537 13:21:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 832.832110] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 832.847124] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 832.853827] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 832.863011] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 832.875725] __nla_parse: 23 callbacks suppressed 13:21:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x35f, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 832.875733] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 832.898843] FAULT_INJECTION: forcing a failure. [ 832.898843] name failslab, interval 1, probability 0, space 0, times 0 13:21:48 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 832.957324] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 832.966414] gfs2: not a GFS2 filesystem [ 832.994797] CPU: 0 PID: 11479 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 833.001997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.011345] Call Trace: [ 833.013949] dump_stack+0x1db/0x2d0 [ 833.017594] ? dump_stack_print_info.cold+0x20/0x20 [ 833.021488] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 833.022664] ? save_stack+0xa9/0xd0 [ 833.022685] ? save_stack+0x45/0xd0 [ 833.022701] ? kasan_slab_alloc+0xf/0x20 [ 833.022724] should_fail.cold+0xa/0x15 [ 833.037463] UDF-fs: Scanning with blocksize 512 failed [ 833.040956] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 833.040983] ? ___might_sleep+0x1e7/0x310 [ 833.041001] ? arch_local_save_flags+0x50/0x50 [ 833.041042] __should_failslab+0x121/0x190 [ 833.068220] should_failslab+0x9/0x14 [ 833.072036] kmem_cache_alloc+0x2be/0x710 [ 833.076196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 833.081755] getname_kernel+0x53/0x370 [ 833.085667] kern_path+0x20/0x40 [ 833.086623] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 833.089036] lookup_bdev+0x109/0x260 [ 833.089051] ? blkdev_open+0x290/0x290 [ 833.089070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.110548] ? getname_flags+0x277/0x5b0 [ 833.114641] kernel_quotactl+0x154/0x1810 [ 833.118795] ? kasan_check_write+0x14/0x20 [ 833.123049] ? __mutex_unlock_slowpath+0x195/0x870 [ 833.128003] ? qtype_enforce_flag+0x80/0x80 [ 833.132326] ? wait_for_completion+0x810/0x810 [ 833.136945] ? check_preemption_disabled+0x48/0x290 [ 833.141976] ? __sb_end_write+0xd9/0x110 [ 833.146048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 833.151581] ? fput+0x128/0x1a0 [ 833.154875] ? do_syscall_64+0x8c/0x800 [ 833.158844] ? do_syscall_64+0x8c/0x800 [ 833.162844] ? lockdep_hardirqs_on+0x415/0x5d0 [ 833.167426] ? trace_hardirqs_on+0xbd/0x310 [ 833.171743] ? __ia32_sys_read+0xb0/0xb0 [ 833.175799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.181158] ? trace_hardirqs_off_caller+0x300/0x300 [ 833.186267] __x64_sys_quotactl+0x97/0xf0 [ 833.190442] do_syscall_64+0x1a3/0x800 [ 833.194327] ? syscall_return_slowpath+0x5f0/0x5f0 [ 833.199252] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 833.204282] ? __switch_to_asm+0x34/0x70 [ 833.208359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 833.213202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.218389] RIP: 0033:0x458099 [ 833.221585] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.240484] RSP: 002b:00007f531d53bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 833.248185] RAX: ffffffffffffffda RBX: 00007f531d53bc90 RCX: 0000000000458099 13:21:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x377, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 833.255449] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000000 [ 833.262725] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 833.269989] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f531d53c6d4 [ 833.277715] R13: 00000000004c4c01 R14: 00000000004d8398 R15: 0000000000000003 [ 833.287777] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 833.295886] UDF-fs: Scanning with blocksize 1024 failed [ 833.301817] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 833.309012] UDF-fs: Scanning with blocksize 2048 failed [ 833.315573] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 833.322639] UDF-fs: Scanning with blocksize 4096 failed 13:21:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4800000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) 13:21:48 executing program 2 (fault-call:2 fault-nth:3): mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x6009, 0x0) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) quotactl(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:21:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x360, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 833.398405] hfsplus: gid requires an argument [ 833.408140] hfsplus: unable to parse mount options [ 833.434739] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 13:21:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x4c00000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x378, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) [ 833.507581] hfsplus: gid requires an argument [ 833.512132] hfsplus: unable to parse mount options [ 833.567858] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 833.587817] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 833.604595] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 13:21:48 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 833.617313] gfs2: not a GFS2 filesystem [ 833.633609] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 833.672034] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 833.694450] FAULT_INJECTION: forcing a failure. [ 833.694450] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 833.706271] CPU: 1 PID: 11522 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #38 [ 833.713456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.722819] Call Trace: [ 833.725411] dump_stack+0x1db/0x2d0 [ 833.729063] ? dump_stack_print_info.cold+0x20/0x20 [ 833.734083] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 833.739364] ? rcu_read_unlock_special+0x380/0x380 [ 833.744301] should_fail.cold+0xa/0x15 [ 833.748217] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 833.753329] ? __kernel_text_address+0xd/0x40 [ 833.757848] ? unwind_get_return_address+0x61/0xa0 [ 833.762790] ? __save_stack_trace+0x8a/0xf0 [ 833.767138] should_fail_alloc_page+0x50/0x60 [ 833.771636] __alloc_pages_nodemask+0x323/0xdc0 [ 833.776305] ? save_stack+0xa9/0xd0 [ 833.779950] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 833.784967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.790522] ? ___might_sleep+0x1e7/0x310 [ 833.794673] ? trace_hardirqs_off+0xb8/0x310 [ 833.799084] cache_grow_begin+0x9c/0x8c0 [ 833.803147] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 833.808681] ? check_preemption_disabled+0x48/0x290 [ 833.813702] kmem_cache_alloc+0x645/0x710 [ 833.817881] getname_kernel+0x53/0x370 [ 833.821771] kern_path+0x20/0x40 [ 833.825145] lookup_bdev+0x109/0x260 [ 833.828870] ? blkdev_open+0x290/0x290 [ 833.832783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.838318] ? getname_flags+0x277/0x5b0 [ 833.842392] kernel_quotactl+0x154/0x1810 [ 833.846552] ? kasan_check_write+0x14/0x20 [ 833.850804] ? __mutex_unlock_slowpath+0x195/0x870 [ 833.855745] ? qtype_enforce_flag+0x80/0x80 [ 833.860069] ? wait_for_completion+0x810/0x810 [ 833.864664] ? check_preemption_disabled+0x48/0x290 [ 833.869691] ? __sb_end_write+0xd9/0x110 [ 833.873758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 833.879295] ? fput+0x128/0x1a0 [ 833.882586] ? do_syscall_64+0x8c/0x800 [ 833.886560] ? do_syscall_64+0x8c/0x800 [ 833.890535] ? lockdep_hardirqs_on+0x415/0x5d0 [ 833.895116] ? trace_hardirqs_on+0xbd/0x310 [ 833.899442] ? __ia32_sys_read+0xb0/0xb0 [ 833.903516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.908879] ? trace_hardirqs_off_caller+0x300/0x300 [ 833.913986] __x64_sys_quotactl+0x97/0xf0 [ 833.918142] do_syscall_64+0x1a3/0x800 [ 833.922032] ? syscall_return_slowpath+0x5f0/0x5f0 [ 833.926962] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 833.931978] ? __switch_to_asm+0x34/0x70 [ 833.936043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 833.940901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.946097] RIP: 0033:0x458099 [ 833.949297] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.968193] RSP: 002b:00007f531d53bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 833.975898] RAX: ffffffffffffffda RBX: 00007f531d53bc90 RCX: 0000000000458099 [ 833.983186] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000000 [ 833.990453] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 833.997720] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f531d53c6d4 [ 834.004988] R13: 00000000004c4c01 R14: 00000000004d8398 R15: 0000000000000003 13:21:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) 13:21:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x361, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) [ 834.034264] UDF-fs: Scanning with blocksize 512 failed [ 834.034548] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 834.048170] gfs2: not a GFS2 filesystem 13:21:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7019160101000000, 0x0, 0x0, 0x0, 0x0) 13:21:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) 13:21:49 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@force='force'}, {@gid={'gid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:21:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6800000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 834.199400] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. [ 834.237553] gfs2: not a GFS2 filesystem 13:21:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7400000000000000, 0x80, &(0x7f0000006780)=@broute={'bropte\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x6c00000000000000, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'bcsh0\x00', 'ip6_vti0\x00', 'nr0\x00', 'veth1_to_bridge\x00', @dev, [], @broadcast, [], 0xb8, 0xb8, 0x108, [@limit={'limit\x00', 0x20, {{0x7fffffff, 0x10001}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x210) [ 834.305822] gfs2: not a GFS2 filesystem [ 834.315540] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 835.023443] net_ratelimit: 20 callbacks suppressed [ 835.023451] protocol 88fb is buggy, dev hsr_slave_0 [ 835.033538] protocol 88fb is buggy, dev hsr_slave_1 [ 835.343399] protocol 88fb is buggy, dev hsr_slave_0 [ 835.348552] protocol 88fb is buggy, dev hsr_slave_1 [ 835.353780] protocol 88fb is buggy, dev hsr_slave_0 [ 835.358863] protocol 88fb is buggy, dev hsr_slave_1 [ 836.143448] protocol 88fb is buggy, dev hsr_slave_0 [ 836.148613] protocol 88fb is buggy, dev hsr_slave_1 [ 836.463390] protocol 88fb is buggy, dev hsr_slave_0 [ 836.468491] protocol 88fb is buggy, dev hsr_slave_1 [ 840.303420] net_ratelimit: 20 callbacks suppressed [ 840.303428] protocol 88fb is buggy, dev hsr_slave_0 [ 840.313496] protocol 88fb is buggy, dev hsr_slave_1 [ 840.623396] protocol 88fb is buggy, dev hsr_slave_0 [ 840.628493] protocol 88fb is buggy, dev hsr_slave_1 [ 840.633644] protocol 88fb is buggy, dev hsr_slave_0 [ 840.638708] protocol 88fb is buggy, dev hsr_slave_1 [ 841.263445] protocol 88fb is buggy, dev hsr_slave_0 [ 841.268640] protocol 88fb is buggy, dev hsr_slave_1 [ 841.583439] protocol 88fb is buggy, dev hsr_slave_0 [ 841.588556] protocol 88fb is buggy, dev hsr_slave_1 [ 845.423473] net_ratelimit: 20 callbacks suppressed [ 845.423482] protocol 88fb is buggy, dev hsr_slave_0 [ 845.433612] protocol 88fb is buggy, dev hsr_slave_1 [ 845.743426] protocol 88fb is buggy, dev hsr_slave_0 [ 845.748525] protocol 88fb is buggy, dev hsr_slave_1 [ 845.753712] protocol 88fb is buggy, dev hsr_slave_0 [ 845.758786] protocol 88fb is buggy, dev hsr_slave_1 [ 846.543417] protocol 88fb is buggy, dev hsr_slave_0 [ 846.548532] protocol 88fb is buggy, dev hsr_slave_1 [ 846.863418] protocol 88fb is buggy, dev hsr_slave_0 [ 846.868506] protocol 88fb is buggy, dev hsr_slave_1 [ 850.703475] net_ratelimit: 20 callbacks suppressed [ 850.703485] protocol 88fb is buggy, dev hsr_slave_0 [ 850.713603] protocol 88fb is buggy, dev hsr_slave_1 [ 851.023412] protocol 88fb is buggy, dev hsr_slave_0 [ 851.028513] protocol 88fb is buggy, dev hsr_slave_1 [ 851.033678] protocol 88fb is buggy, dev hsr_slave_0 [ 851.038751] protocol 88fb is buggy, dev hsr_slave_1 [ 851.663437] protocol 88fb is buggy, dev hsr_slave_0 [ 851.668532] protocol 88fb is buggy, dev hsr_slave_1 [ 851.983383] protocol 88fb is buggy, dev hsr_slave_0 [ 851.988592] protocol 88fb is buggy, dev hsr_slave_1 [ 855.823455] net_ratelimit: 20 callbacks suppressed [ 855.823463] protocol 88fb is buggy, dev hsr_slave_0 [ 855.833522] protocol 88fb is buggy, dev hsr_slave_1 [ 856.143405] protocol 88fb is buggy, dev hsr_slave_0 [ 856.148513] protocol 88fb is buggy, dev hsr_slave_1 [ 856.153689] protocol 88fb is buggy, dev hsr_slave_0 [ 856.158756] protocol 88fb is buggy, dev hsr_slave_1 [ 856.943445] protocol 88fb is buggy, dev hsr_slave_0 [ 856.948560] protocol 88fb is buggy, dev hsr_slave_1 [ 857.263404] protocol 88fb is buggy, dev hsr_slave_0 [ 857.268501] protocol 88fb is buggy, dev hsr_slave_1 [ 861.103443] net_ratelimit: 20 callbacks suppressed [ 861.103452] protocol 88fb is buggy, dev hsr_slave_0 [ 861.113792] protocol 88fb is buggy, dev hsr_slave_1 [ 861.423386] protocol 88fb is buggy, dev hsr_slave_0 [ 861.428589] protocol 88fb is buggy, dev hsr_slave_1 [ 861.433952] protocol 88fb is buggy, dev hsr_slave_0 [ 861.439039] protocol 88fb is buggy, dev hsr_slave_1 [ 862.063447] protocol 88fb is buggy, dev hsr_slave_0 [ 862.068655] protocol 88fb is buggy, dev hsr_slave_1 [ 862.383453] protocol 88fb is buggy, dev hsr_slave_0 [ 862.388573] protocol 88fb is buggy, dev hsr_slave_1 [ 866.223492] net_ratelimit: 20 callbacks suppressed [ 866.223501] protocol 88fb is buggy, dev hsr_slave_0 [ 866.233602] protocol 88fb is buggy, dev hsr_slave_1 [ 866.543448] protocol 88fb is buggy, dev hsr_slave_0 [ 866.548561] protocol 88fb is buggy, dev hsr_slave_1 [ 866.553798] protocol 88fb is buggy, dev hsr_slave_0 [ 866.558885] protocol 88fb is buggy, dev hsr_slave_1 [ 867.343432] protocol 88fb is buggy, dev hsr_slave_0 [ 867.348633] protocol 88fb is buggy, dev hsr_slave_1 [ 867.663442] protocol 88fb is buggy, dev hsr_slave_0 [ 867.668566] protocol 88fb is buggy, dev hsr_slave_1 [ 871.503426] net_ratelimit: 20 callbacks suppressed [ 871.503435] protocol 88fb is buggy, dev hsr_slave_0 [ 871.513493] protocol 88fb is buggy, dev hsr_slave_1 [ 871.823382] protocol 88fb is buggy, dev hsr_slave_0 [ 871.828462] protocol 88fb is buggy, dev hsr_slave_1 [ 871.833608] protocol 88fb is buggy, dev hsr_slave_0 [ 871.838763] protocol 88fb is buggy, dev hsr_slave_1 [ 872.463433] protocol 88fb is buggy, dev hsr_slave_0 [ 872.468533] protocol 88fb is buggy, dev hsr_slave_1 [ 872.783391] protocol 88fb is buggy, dev hsr_slave_0 [ 872.788475] protocol 88fb is buggy, dev hsr_slave_1 [ 876.623500] net_ratelimit: 20 callbacks suppressed [ 876.623509] protocol 88fb is buggy, dev hsr_slave_0 [ 876.633642] protocol 88fb is buggy, dev hsr_slave_1 [ 876.943481] protocol 88fb is buggy, dev hsr_slave_0 [ 876.948598] protocol 88fb is buggy, dev hsr_slave_1 [ 876.953784] protocol 88fb is buggy, dev hsr_slave_0 [ 876.958860] protocol 88fb is buggy, dev hsr_slave_1 [ 877.743500] protocol 88fb is buggy, dev hsr_slave_0 [ 877.748660] protocol 88fb is buggy, dev hsr_slave_1 [ 878.063410] protocol 88fb is buggy, dev hsr_slave_0 [ 878.068525] protocol 88fb is buggy, dev hsr_slave_1 [ 881.903424] net_ratelimit: 20 callbacks suppressed [ 881.903432] protocol 88fb is buggy, dev hsr_slave_0 [ 881.913516] protocol 88fb is buggy, dev hsr_slave_1 [ 882.223383] protocol 88fb is buggy, dev hsr_slave_0 [ 882.228469] protocol 88fb is buggy, dev hsr_slave_1 [ 882.233633] protocol 88fb is buggy, dev hsr_slave_0 [ 882.238741] protocol 88fb is buggy, dev hsr_slave_1 [ 882.863610] protocol 88fb is buggy, dev hsr_slave_0 [ 882.868789] protocol 88fb is buggy, dev hsr_slave_1 [ 883.183435] protocol 88fb is buggy, dev hsr_slave_0 [ 883.188560] protocol 88fb is buggy, dev hsr_slave_1 [ 887.023437] net_ratelimit: 20 callbacks suppressed [ 887.023447] protocol 88fb is buggy, dev hsr_slave_0 [ 887.033563] protocol 88fb is buggy, dev hsr_slave_1 [ 887.343453] protocol 88fb is buggy, dev hsr_slave_0 [ 887.348548] protocol 88fb is buggy, dev hsr_slave_1 [ 887.353778] protocol 88fb is buggy, dev hsr_slave_0 [ 887.358860] protocol 88fb is buggy, dev hsr_slave_1 [ 888.143452] protocol 88fb is buggy, dev hsr_slave_0 [ 888.148587] protocol 88fb is buggy, dev hsr_slave_1 [ 888.463420] protocol 88fb is buggy, dev hsr_slave_0 [ 888.468528] protocol 88fb is buggy, dev hsr_slave_1 [ 892.303423] net_ratelimit: 20 callbacks suppressed [ 892.303431] protocol 88fb is buggy, dev hsr_slave_0 [ 892.313512] protocol 88fb is buggy, dev hsr_slave_1 [ 892.623462] protocol 88fb is buggy, dev hsr_slave_0 [ 892.628590] protocol 88fb is buggy, dev hsr_slave_1 [ 892.633831] protocol 88fb is buggy, dev hsr_slave_0 [ 892.638908] protocol 88fb is buggy, dev hsr_slave_1 [ 893.263464] protocol 88fb is buggy, dev hsr_slave_0 [ 893.268581] protocol 88fb is buggy, dev hsr_slave_1 [ 893.583406] protocol 88fb is buggy, dev hsr_slave_0 [ 893.588507] protocol 88fb is buggy, dev hsr_slave_1 [ 893.685175] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 897.423476] net_ratelimit: 20 callbacks suppressed [ 897.423484] protocol 88fb is buggy, dev hsr_slave_0 [ 897.433653] protocol 88fb is buggy, dev hsr_slave_1 [ 897.743397] protocol 88fb is buggy, dev hsr_slave_0 [ 897.748497] protocol 88fb is buggy, dev hsr_slave_1 [ 897.753694] protocol 88fb is buggy, dev hsr_slave_0 [ 897.758762] protocol 88fb is buggy, dev hsr_slave_1 [ 898.543422] protocol 88fb is buggy, dev hsr_slave_0 [ 898.548560] protocol 88fb is buggy, dev hsr_slave_1 [ 898.863410] protocol 88fb is buggy, dev hsr_slave_0 [ 898.868518] protocol 88fb is buggy, dev hsr_slave_1 [ 902.703468] net_ratelimit: 20 callbacks suppressed [ 902.703477] protocol 88fb is buggy, dev hsr_slave_0 [ 902.713569] protocol 88fb is buggy, dev hsr_slave_1 [ 903.023370] protocol 88fb is buggy, dev hsr_slave_0 [ 903.028445] protocol 88fb is buggy, dev hsr_slave_1 [ 903.033593] protocol 88fb is buggy, dev hsr_slave_0 [ 903.038654] protocol 88fb is buggy, dev hsr_slave_1 [ 903.663460] protocol 88fb is buggy, dev hsr_slave_0 [ 903.668550] protocol 88fb is buggy, dev hsr_slave_1 [ 903.983431] protocol 88fb is buggy, dev hsr_slave_0 [ 903.988543] protocol 88fb is buggy, dev hsr_slave_1 [ 907.823444] net_ratelimit: 20 callbacks suppressed [ 907.823452] protocol 88fb is buggy, dev hsr_slave_0 [ 907.833540] protocol 88fb is buggy, dev hsr_slave_1 [ 908.143400] protocol 88fb is buggy, dev hsr_slave_0 [ 908.148474] protocol 88fb is buggy, dev hsr_slave_1 [ 908.153628] protocol 88fb is buggy, dev hsr_slave_0 [ 908.158719] protocol 88fb is buggy, dev hsr_slave_1 [ 908.943462] protocol 88fb is buggy, dev hsr_slave_0 [ 908.948607] protocol 88fb is buggy, dev hsr_slave_1 [ 909.263420] protocol 88fb is buggy, dev hsr_slave_0 [ 909.268541] protocol 88fb is buggy, dev hsr_slave_1 [ 913.103503] net_ratelimit: 20 callbacks suppressed [ 913.103513] protocol 88fb is buggy, dev hsr_slave_0 [ 913.113624] protocol 88fb is buggy, dev hsr_slave_1 [ 913.423423] protocol 88fb is buggy, dev hsr_slave_0 [ 913.428552] protocol 88fb is buggy, dev hsr_slave_1 [ 913.433717] protocol 88fb is buggy, dev hsr_slave_0 [ 913.438846] protocol 88fb is buggy, dev hsr_slave_1 [ 914.063499] protocol 88fb is buggy, dev hsr_slave_0 [ 914.068615] protocol 88fb is buggy, dev hsr_slave_1 [ 914.383404] protocol 88fb is buggy, dev hsr_slave_0 [ 914.388508] protocol 88fb is buggy, dev hsr_slave_1 [ 918.223454] net_ratelimit: 20 callbacks suppressed [ 918.223462] protocol 88fb is buggy, dev hsr_slave_0 [ 918.233540] protocol 88fb is buggy, dev hsr_slave_1 [ 918.543397] protocol 88fb is buggy, dev hsr_slave_0 [ 918.548496] protocol 88fb is buggy, dev hsr_slave_1 [ 918.553679] protocol 88fb is buggy, dev hsr_slave_0 [ 918.558755] protocol 88fb is buggy, dev hsr_slave_1 [ 919.343482] protocol 88fb is buggy, dev hsr_slave_0 [ 919.348609] protocol 88fb is buggy, dev hsr_slave_1 [ 919.663423] protocol 88fb is buggy, dev hsr_slave_0 [ 919.668520] protocol 88fb is buggy, dev hsr_slave_1 [ 923.503497] net_ratelimit: 20 callbacks suppressed [ 923.503506] protocol 88fb is buggy, dev hsr_slave_0 [ 923.513756] protocol 88fb is buggy, dev hsr_slave_1 [ 923.823419] protocol 88fb is buggy, dev hsr_slave_0 [ 923.828529] protocol 88fb is buggy, dev hsr_slave_1 [ 923.833722] protocol 88fb is buggy, dev hsr_slave_0 [ 923.838798] protocol 88fb is buggy, dev hsr_slave_1 [ 924.463500] protocol 88fb is buggy, dev hsr_slave_0 [ 924.468638] protocol 88fb is buggy, dev hsr_slave_1 [ 924.783425] protocol 88fb is buggy, dev hsr_slave_0 [ 924.788578] protocol 88fb is buggy, dev hsr_slave_1 [ 928.623488] net_ratelimit: 20 callbacks suppressed [ 928.623496] protocol 88fb is buggy, dev hsr_slave_0 [ 928.633561] protocol 88fb is buggy, dev hsr_slave_1 [ 928.943433] protocol 88fb is buggy, dev hsr_slave_0 [ 928.948543] protocol 88fb is buggy, dev hsr_slave_1 [ 928.953733] protocol 88fb is buggy, dev hsr_slave_0 [ 928.958804] protocol 88fb is buggy, dev hsr_slave_1 [ 929.743417] protocol 88fb is buggy, dev hsr_slave_0 [ 929.748540] protocol 88fb is buggy, dev hsr_slave_1 [ 930.063433] protocol 88fb is buggy, dev hsr_slave_0 [ 930.068549] protocol 88fb is buggy, dev hsr_slave_1 [ 933.903420] net_ratelimit: 20 callbacks suppressed [ 933.903430] protocol 88fb is buggy, dev hsr_slave_0 [ 933.913508] protocol 88fb is buggy, dev hsr_slave_1 [ 934.223426] protocol 88fb is buggy, dev hsr_slave_0 [ 934.228534] protocol 88fb is buggy, dev hsr_slave_1 [ 934.233732] protocol 88fb is buggy, dev hsr_slave_0 [ 934.238829] protocol 88fb is buggy, dev hsr_slave_1 [ 934.863513] protocol 88fb is buggy, dev hsr_slave_0 [ 934.868644] protocol 88fb is buggy, dev hsr_slave_1 [ 935.183407] protocol 88fb is buggy, dev hsr_slave_0 [ 935.188522] protocol 88fb is buggy, dev hsr_slave_1 [ 939.023452] net_ratelimit: 20 callbacks suppressed [ 939.023460] protocol 88fb is buggy, dev hsr_slave_0 [ 939.033523] protocol 88fb is buggy, dev hsr_slave_1 [ 939.343358] protocol 88fb is buggy, dev hsr_slave_0 [ 939.348427] protocol 88fb is buggy, dev hsr_slave_1 [ 939.353569] protocol 88fb is buggy, dev hsr_slave_0 [ 939.358634] protocol 88fb is buggy, dev hsr_slave_1 [ 940.143429] protocol 88fb is buggy, dev hsr_slave_0 [ 940.148527] protocol 88fb is buggy, dev hsr_slave_1 [ 940.463420] protocol 88fb is buggy, dev hsr_slave_0 [ 940.468536] protocol 88fb is buggy, dev hsr_slave_1 [ 944.303430] net_ratelimit: 20 callbacks suppressed [ 944.303440] protocol 88fb is buggy, dev hsr_slave_0 [ 944.313758] protocol 88fb is buggy, dev hsr_slave_1 [ 944.623419] protocol 88fb is buggy, dev hsr_slave_0 [ 944.628525] protocol 88fb is buggy, dev hsr_slave_1 [ 944.633756] protocol 88fb is buggy, dev hsr_slave_0 [ 944.638858] protocol 88fb is buggy, dev hsr_slave_1 [ 945.263489] protocol 88fb is buggy, dev hsr_slave_0 [ 945.268717] protocol 88fb is buggy, dev hsr_slave_1 [ 945.583409] protocol 88fb is buggy, dev hsr_slave_0 [ 945.588509] protocol 88fb is buggy, dev hsr_slave_1 [ 949.423495] net_ratelimit: 20 callbacks suppressed [ 949.423503] protocol 88fb is buggy, dev hsr_slave_0 [ 949.433581] protocol 88fb is buggy, dev hsr_slave_1 [ 949.743386] protocol 88fb is buggy, dev hsr_slave_0 [ 949.748484] protocol 88fb is buggy, dev hsr_slave_1 [ 949.753706] protocol 88fb is buggy, dev hsr_slave_0 [ 949.758757] protocol 88fb is buggy, dev hsr_slave_1 [ 950.543408] protocol 88fb is buggy, dev hsr_slave_0 [ 950.548515] protocol 88fb is buggy, dev hsr_slave_1 [ 950.863402] protocol 88fb is buggy, dev hsr_slave_0 [ 950.868501] protocol 88fb is buggy, dev hsr_slave_1 [ 954.703431] net_ratelimit: 20 callbacks suppressed [ 954.703439] protocol 88fb is buggy, dev hsr_slave_0 [ 954.713494] protocol 88fb is buggy, dev hsr_slave_1 [ 955.023393] protocol 88fb is buggy, dev hsr_slave_0 [ 955.028491] protocol 88fb is buggy, dev hsr_slave_1 [ 955.033664] protocol 88fb is buggy, dev hsr_slave_0 [ 955.038729] protocol 88fb is buggy, dev hsr_slave_1 [ 955.663505] protocol 88fb is buggy, dev hsr_slave_0 [ 955.668616] protocol 88fb is buggy, dev hsr_slave_1 [ 955.983365] protocol 88fb is buggy, dev hsr_slave_0 [ 955.988425] protocol 88fb is buggy, dev hsr_slave_1 [ 959.823475] net_ratelimit: 20 callbacks suppressed [ 959.823483] protocol 88fb is buggy, dev hsr_slave_0 [ 959.833573] protocol 88fb is buggy, dev hsr_slave_1 [ 960.143390] protocol 88fb is buggy, dev hsr_slave_0 [ 960.148468] protocol 88fb is buggy, dev hsr_slave_1 [ 960.153601] protocol 88fb is buggy, dev hsr_slave_0 [ 960.158652] protocol 88fb is buggy, dev hsr_slave_1 [ 960.943400] protocol 88fb is buggy, dev hsr_slave_0 [ 960.948505] protocol 88fb is buggy, dev hsr_slave_1 [ 961.263413] protocol 88fb is buggy, dev hsr_slave_0 [ 961.268533] protocol 88fb is buggy, dev hsr_slave_1 [ 965.103412] net_ratelimit: 20 callbacks suppressed [ 965.103430] protocol 88fb is buggy, dev hsr_slave_0 [ 965.113550] protocol 88fb is buggy, dev hsr_slave_1 [ 965.423403] protocol 88fb is buggy, dev hsr_slave_0 [ 965.428512] protocol 88fb is buggy, dev hsr_slave_1 [ 965.433666] protocol 88fb is buggy, dev hsr_slave_0 [ 965.438830] protocol 88fb is buggy, dev hsr_slave_1 [ 966.063512] protocol 88fb is buggy, dev hsr_slave_0 [ 966.068631] protocol 88fb is buggy, dev hsr_slave_1 [ 966.383397] protocol 88fb is buggy, dev hsr_slave_0 [ 966.388469] protocol 88fb is buggy, dev hsr_slave_1 [ 970.223485] net_ratelimit: 20 callbacks suppressed [ 970.223494] protocol 88fb is buggy, dev hsr_slave_0 [ 970.233584] protocol 88fb is buggy, dev hsr_slave_1 [ 970.543432] protocol 88fb is buggy, dev hsr_slave_0 [ 970.548549] protocol 88fb is buggy, dev hsr_slave_1 [ 970.553733] protocol 88fb is buggy, dev hsr_slave_0 [ 970.558797] protocol 88fb is buggy, dev hsr_slave_1 [ 971.343390] protocol 88fb is buggy, dev hsr_slave_0 [ 971.348514] protocol 88fb is buggy, dev hsr_slave_1 [ 971.663418] protocol 88fb is buggy, dev hsr_slave_0 [ 971.668625] protocol 88fb is buggy, dev hsr_slave_1 [ 975.503390] net_ratelimit: 20 callbacks suppressed [ 975.503398] protocol 88fb is buggy, dev hsr_slave_0 [ 975.513468] protocol 88fb is buggy, dev hsr_slave_1 [ 975.823417] protocol 88fb is buggy, dev hsr_slave_0 [ 975.828499] protocol 88fb is buggy, dev hsr_slave_1 [ 975.833725] protocol 88fb is buggy, dev hsr_slave_0 [ 975.838800] protocol 88fb is buggy, dev hsr_slave_1 [ 976.463518] protocol 88fb is buggy, dev hsr_slave_0 [ 976.468652] protocol 88fb is buggy, dev hsr_slave_1 [ 976.783391] protocol 88fb is buggy, dev hsr_slave_0 [ 976.788499] protocol 88fb is buggy, dev hsr_slave_1 [ 980.623470] net_ratelimit: 20 callbacks suppressed [ 980.623479] protocol 88fb is buggy, dev hsr_slave_0 [ 980.633546] protocol 88fb is buggy, dev hsr_slave_1 [ 980.943378] protocol 88fb is buggy, dev hsr_slave_0 [ 980.948479] protocol 88fb is buggy, dev hsr_slave_1 [ 980.953647] protocol 88fb is buggy, dev hsr_slave_0 [ 980.958729] protocol 88fb is buggy, dev hsr_slave_1 [ 981.743422] protocol 88fb is buggy, dev hsr_slave_0 [ 981.748529] protocol 88fb is buggy, dev hsr_slave_1 [ 982.063401] protocol 88fb is buggy, dev hsr_slave_0 [ 982.068471] protocol 88fb is buggy, dev hsr_slave_1 [ 983.184469] INFO: task syz-executor2:11522 blocked for more than 140 seconds. [ 983.191767] Not tainted 5.0.0-rc3+ #38 [ 983.213315] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 983.221282] syz-executor2 D26344 11522 8352 0x80000004 [ 983.243318] Call Trace: [ 983.245933] __schedule+0x897/0x1e60 [ 983.249651] ? pci_mmcfg_check_reserved+0x170/0x170 [ 983.263328] ? __lock_acquire+0x572/0x4a30 [ 983.267591] ? rwsem_down_read_failed+0x32e/0x6d0 [ 983.272481] ? mark_held_locks+0xb1/0x100 [ 983.293326] ? _raw_spin_unlock_irq+0x28/0x90 [ 983.297934] schedule+0xfe/0x350 [ 983.301312] ? kasan_check_read+0x11/0x20 [ 983.313325] ? __schedule+0x1e60/0x1e60 [ 983.317301] ? trace_hardirqs_off_caller+0x300/0x300 [ 983.322399] ? do_raw_spin_trylock+0x270/0x270 [ 983.343338] rwsem_down_read_failed+0x360/0x6d0 [ 983.348024] ? rt_mutex_futex_unlock+0x120/0x120 [ 983.352806] ? add_lock_to_list.isra.0+0x450/0x450 [ 983.373333] ? lock_acquire+0x1db/0x570 [ 983.377310] ? __get_super.part.0+0x203/0x2e0 [ 983.381872] ? ___might_sleep+0x1e7/0x310 [ 983.413329] ? lock_release+0xc40/0xc40 [ 983.417313] ? putname+0xef/0x130 [ 983.420767] call_rwsem_down_read_failed+0x18/0x30 [ 983.433333] down_read+0x9b/0x120 [ 983.436799] ? __get_super.part.0+0x203/0x2e0 [ 983.441304] ? __down_interruptible+0x740/0x740 [ 983.483340] ? rwlock_bug.part.0+0x90/0x90 [ 983.487596] __get_super.part.0+0x203/0x2e0 [ 983.491926] __get_super_thawed+0x153/0x310 [ 983.503358] ? rcu_pm_notify+0xd0/0xd0 [ 983.507263] ? get_super+0x50/0x50 [ 983.510814] ? putname+0xef/0x130 [ 983.523338] ? putname+0xef/0x130 [ 983.526901] ? rcu_read_lock_sched_held+0x110/0x130 [ 983.531914] ? kmem_cache_free+0x225/0x260 [ 983.536441] get_super_thawed+0x18/0x20 [ 983.540426] kernel_quotactl+0x200/0x1810 [ 983.553477] ? kasan_check_write+0x14/0x20 [ 983.557758] ? qtype_enforce_flag+0x80/0x80 [ 983.562082] ? wait_for_completion+0x810/0x810 [ 983.583369] ? check_preemption_disabled+0x48/0x290 [ 983.588423] ? __sb_end_write+0xd9/0x110 [ 983.592493] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 983.613341] ? fput+0x128/0x1a0 [ 983.616630] ? do_syscall_64+0x8c/0x800 [ 983.620596] ? do_syscall_64+0x8c/0x800 [ 983.633368] ? lockdep_hardirqs_on+0x415/0x5d0 [ 983.637971] ? trace_hardirqs_on+0xbd/0x310 [ 983.642288] ? __ia32_sys_read+0xb0/0xb0 [ 983.663415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.668798] ? trace_hardirqs_off_caller+0x300/0x300 [ 983.674166] __x64_sys_quotactl+0x97/0xf0 [ 983.678318] do_syscall_64+0x1a3/0x800 [ 983.682206] ? syscall_return_slowpath+0x5f0/0x5f0 [ 983.687423] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 983.692454] ? __switch_to_asm+0x34/0x70 [ 983.696896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 983.701800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.707274] RIP: 0033:0x458099 [ 983.710501] Code: Bad RIP value. [ 983.714138] RSP: 002b:00007f531d53bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 983.721847] RAX: ffffffffffffffda RBX: 00007f531d53bc90 RCX: 0000000000458099 [ 983.730357] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000000 [ 983.737929] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 983.753466] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f531d53c6d4 [ 983.760780] R13: 00000000004c4c01 R14: 00000000004d8398 R15: 0000000000000003 [ 983.783357] [ 983.783357] Showing all locks held in the system: [ 983.789697] 1 lock held by khungtaskd/1042: [ 983.803331] #0: 00000000ca8c0bfb (rcu_read_lock){....}, at: debug_show_all_locks+0xc6/0x41d [ 983.811974] 1 lock held by rsyslogd/8222: [ 983.833332] #0: 0000000036a37eea (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1b3/0x1f0 [ 983.841427] 2 locks held by getty/8311: [ 983.863318] #0: 0000000096465327 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 983.871576] #1: 00000000d83192d1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 983.880859] 2 locks held by getty/8312: [ 983.885114] #0: 0000000055d0ecd1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 983.893598] #1: 000000005809ceac (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 983.902460] 2 locks held by getty/8313: [ 983.906817] #0: 0000000027e64f59 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 983.915347] #1: 00000000b568e115 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 983.924440] 2 locks held by getty/8314: [ 983.928407] #0: 0000000007ee3862 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 983.936927] #1: 00000000394fa158 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 983.953499] 2 locks held by getty/8315: [ 983.957489] #0: 0000000079af6811 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 983.984122] #1: 000000001912072f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 983.992992] 2 locks held by getty/8316: [ 984.013339] #0: 00000000625c3ca5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 984.021609] #1: 00000000d7de7779 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 984.043331] 2 locks held by getty/8317: [ 984.047319] #0: 0000000005daa812 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 984.073349] #1: 000000003a299b47 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 984.082250] 2 locks held by syz-executor2/11514: [ 984.103324] 1 lock held by syz-executor2/11522: [ 984.107993] #0: 00000000fde747cd (&type->s_umount_key#51){++++}, at: __get_super.part.0+0x203/0x2e0 [ 984.133320] [ 984.134961] ============================================= [ 984.134961] [ 984.141966] NMI backtrace for cpu 0 [ 984.145654] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.0.0-rc3+ #38 [ 984.152516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.161897] Call Trace: [ 984.164496] dump_stack+0x1db/0x2d0 [ 984.168131] ? dump_stack_print_info.cold+0x20/0x20 [ 984.173159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.178725] nmi_cpu_backtrace.cold+0x63/0xa4 [ 984.183266] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 984.188192] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 984.193466] arch_trigger_cpumask_backtrace+0x14/0x20 [ 984.198642] watchdog+0xbbb/0x1170 [ 984.202192] ? reset_hung_task_detector+0xd0/0xd0 [ 984.207035] ? lockdep_hardirqs_on+0x415/0x5d0 [ 984.211665] ? trace_hardirqs_on+0xbd/0x310 [ 984.216026] ? kasan_check_read+0x11/0x20 [ 984.220171] ? __kthread_parkme+0xc3/0x1b0 [ 984.224397] ? trace_hardirqs_off_caller+0x300/0x300 [ 984.229499] ? do_raw_spin_trylock+0x270/0x270 [ 984.234076] ? schedule+0x108/0x350 [ 984.237723] ? do_raw_spin_trylock+0x270/0x270 [ 984.242326] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 984.247424] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.252959] ? __kthread_parkme+0xfb/0x1b0 [ 984.257201] kthread+0x357/0x430 [ 984.260610] ? reset_hung_task_detector+0xd0/0xd0 [ 984.265465] ? kthread_stop+0x920/0x920 [ 984.269531] ret_from_fork+0x3a/0x50 [ 984.273341] Sending NMI from CPU 0 to CPUs 1: [ 984.279013] NMI backtrace for cpu 1 [ 984.279019] CPU: 1 PID: 21 Comm: kworker/u4:1 Not tainted 5.0.0-rc3+ #38 [ 984.279025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.279029] Workqueue: bat_events batadv_nc_worker [ 984.279035] RIP: 0010:lockdep_hardirqs_on+0x37a/0x5d0 [ 984.279045] Code: 80 3d 91 5b f7 08 00 0f 85 ba 01 00 00 65 48 8b 1c 25 40 ee 01 00 48 8d bb 4c 08 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa <48> c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 [ 984.279049] RSP: 0018:ffff8880a95af680 EFLAGS: 00000046 [ 984.279057] RAX: dffffc0000000000 RBX: ffff8880a95a0580 RCX: 1ffffffff14b7641 [ 984.279061] RDX: ffff8880a95a0dcc RSI: ffffffff818858c4 RDI: ffff8880a95a0dcc [ 984.279066] RBP: ffff8880a95af690 R08: ffff8880a95a0580 R09: 0000000000000000 [ 984.279071] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff814d368a [ 984.279087] R13: ffff8880a95a0580 R14: ffffffff814d368a R15: dffffc0000000000 [ 984.279092] FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 984.279096] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 984.279117] CR2: ffffffffff600400 CR3: 00000000979f7000 CR4: 00000000001406e0 [ 984.279121] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 984.279126] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 984.279129] Call Trace: [ 984.279132] trace_hardirqs_on+0xbd/0x310 [ 984.279136] ? _raw_spin_unlock_bh+0x31/0x40 [ 984.279140] ? trace_hardirqs_off_caller+0x300/0x300 [ 984.279143] ? do_raw_spin_unlock+0xa0/0x330 [ 984.279147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.279151] ? check_preemption_disabled+0x48/0x290 [ 984.279155] ? do_raw_spin_trylock+0x270/0x270 [ 984.279159] ? batadv_nc_purge_paths+0x36d/0x530 [ 984.279162] __local_bh_enable_ip+0x15a/0x270 [ 984.279166] _raw_spin_unlock_bh+0x31/0x40 [ 984.279170] batadv_nc_purge_paths+0x36d/0x530 [ 984.279173] ? lock_downgrade+0x910/0x910 [ 984.279177] ? batadv_nc_to_purge_nc_path_coding+0x280/0x280 [ 984.279181] ? batadv_nc_packet_free+0xb0/0xb0 [ 984.279185] ? rcu_read_unlock_special+0x380/0x380 [ 984.279188] ? process_one_work+0xbf1/0x1ce0 [ 984.279192] batadv_nc_worker+0x3e3/0x920 [ 984.279195] ? batadv_nc_purge_orig+0x50/0x50 [ 984.279199] ? __lock_is_held+0xb6/0x140 [ 984.279203] process_one_work+0xd0c/0x1ce0 [ 984.279238] ? preempt_notifier_register+0x200/0x200 [ 984.279242] ? __switch_to_asm+0x34/0x70 [ 984.279245] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 984.279249] ? __schedule+0x89f/0x1e60 [ 984.279253] ? pci_mmcfg_check_reserved+0x170/0x170 [ 984.279257] ? worker_thread+0x3b7/0x14a0 [ 984.279261] ? worker_thread+0x3b7/0x14a0 [ 984.279264] ? find_held_lock+0x35/0x120 [ 984.279268] ? lock_acquire+0x1db/0x570 [ 984.279272] ? worker_thread+0x3cd/0x14a0 [ 984.279275] ? kasan_check_read+0x11/0x20 [ 984.279279] ? do_raw_spin_lock+0x156/0x360 [ 984.279283] ? lock_release+0xc40/0xc40 [ 984.279286] ? rwlock_bug.part.0+0x90/0x90 [ 984.279291] ? trace_hardirqs_on_caller+0x310/0x310 [ 984.279294] worker_thread+0x143/0x14a0 [ 984.279298] ? process_one_work+0x1ce0/0x1ce0 [ 984.279302] ? __kthread_parkme+0xc3/0x1b0 [ 984.279305] ? lock_acquire+0x1db/0x570 [ 984.279309] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 984.279313] ? lockdep_hardirqs_on+0x415/0x5d0 [ 984.279316] ? trace_hardirqs_on+0xbd/0x310 [ 984.279320] ? __kthread_parkme+0xc3/0x1b0 [ 984.279324] ? trace_hardirqs_off_caller+0x300/0x300 [ 984.279328] ? do_raw_spin_trylock+0x270/0x270 [ 984.279331] ? schedule+0x108/0x350 [ 984.279335] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 984.279339] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.279343] ? __kthread_parkme+0xfb/0x1b0 [ 984.279346] kthread+0x357/0x430 [ 984.279350] ? process_one_work+0x1ce0/0x1ce0 [ 984.279353] ? kthread_stop+0x920/0x920 [ 984.279357] ret_from_fork+0x3a/0x50 [ 984.289192] Kernel panic - not syncing: hung_task: blocked tasks [ 984.650078] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.0.0-rc3+ #38 [ 984.656907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.666253] Call Trace: [ 984.668889] dump_stack+0x1db/0x2d0 [ 984.672514] ? dump_stack_print_info.cold+0x20/0x20 [ 984.677546] panic+0x2cb/0x65c [ 984.680754] ? add_taint.cold+0x16/0x16 [ 984.684726] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 984.689675] ? ___preempt_schedule+0x16/0x18 [ 984.694096] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 984.699551] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 984.705041] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 984.710499] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 984.715947] watchdog+0xbcc/0x1170 [ 984.719496] ? reset_hung_task_detector+0xd0/0xd0 [ 984.724338] ? lockdep_hardirqs_on+0x415/0x5d0 [ 984.728915] ? trace_hardirqs_on+0xbd/0x310 [ 984.733237] ? kasan_check_read+0x11/0x20 [ 984.737399] ? __kthread_parkme+0xc3/0x1b0 [ 984.741630] ? trace_hardirqs_off_caller+0x300/0x300 [ 984.746732] ? do_raw_spin_trylock+0x270/0x270 [ 984.751303] ? schedule+0x108/0x350 [ 984.754926] ? do_raw_spin_trylock+0x270/0x270 [ 984.759522] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 984.764635] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.770169] ? __kthread_parkme+0xfb/0x1b0 [ 984.774444] kthread+0x357/0x430 [ 984.777822] ? reset_hung_task_detector+0xd0/0xd0 [ 984.782690] ? kthread_stop+0x920/0x920 [ 984.786704] ret_from_fork+0x3a/0x50 [ 984.791583] Kernel Offset: disabled [ 984.795205] Rebooting in 86400 seconds..