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", 0x1000}], 0x9, &(0x7f0000005500)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xd}}, @init={0x18, 0x84, 0x0, {0x1, 0x9, 0x3ff, 0x2}}, @sndinfo={0x20, 0x84, 0x2, {0xcd, 0x6, 0x1ff, 0x100, r6}}], 0x58, 0xc010}, {&(0x7f0000005580)=@in={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f00000057c0)=[{&(0x7f00000055c0)="67c6bfe136fbc9e110bac17b347584bf2a8301f430484a4fcfd28549c1a9c55a6c3db4da0aae98b45bcb73bff502b835f0a43dd94965489b2550e15f75d6ca3bc5491e44e2dcbc10fa67668ff25db7efa05b5a7867d0ddb55e01ddc47639faad22edeedf75920ea1116a37e2e25777286b9c2f01b68bb4144c6b61e233c4d80431a069d77c3ab17ce509f24b42709f7a0c8a13dd2ce81a4cad4a8b1f3f50e6bb4209f63915a870a19013c9e69510da44ee6be9931c8cc1962adc275e539627607420668cbf1489203d35e313141e7aebf6fd2c5ce578946b648eecce1568cfafce9b724ecd46821d0df916e72555cb43f274f82590", 0xf5}, {&(0x7f00000056c0)="1187aee9ac2fb3491ab6fd7c490cc060472cce1ffbc8ede464d26d65d69500fd4761d157cd94f0279a64f700bfbaa597e13d24575bd0bc379b5893230b162c528ea9f7b0bc1aaa66c25a94718d48274d0506bb9463b37ea137", 0x59}, {&(0x7f0000005740)="f78f211ef5eec6c4371cf51d0d44be57677e68fae24452174df17aa4d0b2e3d4a966dd2ce99c499075ad5f96c9e34d15f88f1845f644439a20c1ad5a35853034d541b30f4f602ed740af94e424bb04e220c9a4", 0x53}], 0x3, 0x0, 0x0, 0x40004}, {&(0x7f0000005800)=@in6={0xa, 0x4e22, 0x8, @local, 0x5}, 0x1c, &(0x7f0000006bc0)=[{&(0x7f0000005840)="6c9d76be29a5f4eca3124ab74c78e1d469dc21f61fcb6a86bcde1903e483c7d657d894fa4fefe86201e46e18c5f524caa7dd61b9d23585691eb9858bbc8535cbb1bda38a47237cc4d47041ae4d7f477d70b377d6e855ee42a124b328157111c557d316e3887c8aa7d010ca1d3a41f9ac6ca501a79af70a2c2314b5e38ffd1bec39ca8402320c1664376d69a2902dd617645ea124115e115283bea8e668f700274ec07132d9b76afb39bbdc20a10f38ee9fb2cd38cc678d14c0134ce7e1858ded82421b38f85c5c3e922ee24f3a06bc977b412b3d96d8a3b870ebfd73a354c913109251ad77b6ef2034f89f34407f336cb3fe", 0xf2}, {&(0x7f0000005940)="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", 0x1000}, {&(0x7f0000006940)="493a45f3f11223d1770e64f6e9247de3f8461ef2f56a9118ae8ef9afbf1ae1221f320a9bb8e58f0391aa35d1295c6e2ae2d0c21437a07123ad0c5442e234c181bcacd98cc7f4ea6d4538db13b7c0c2921ec592f4c2009556e4ed7b2c7199637905851c2df056a5d7f27deabc6a43278d616826e813ea7c32879f2b2025e30923d0c84f110f5c87662c3fe496439fb3e130e84eb9eb2681d65f8c5c41233fcb6229e35a0341bdeb", 0xa7}, {&(0x7f0000006a00)="bab4f926bec08984e596d2e9734a9f7122f3266b8ef5821169135e4c5cb76a90609e9426822fa5f999823ef12d8002be30e869a749e15884961e53346343a2945c", 0x41}, {&(0x7f0000006a80)="94280a96d30925d39579d8b9f1fdc4aa67406239530a0de8de8a230474d25577018218a4193f03d6297b1fa1b7f6befff6d750ef34ffec438bc13e3b03aaf129097c094055a5c1ff5a865344a67ce50801921cb9902f4cbf488f65e83f7491ff28b0640d0f114cf288acdc05c65cbb670bbaeff81e072867e3be9bc1b4cf3bfcc66ff83538eb7bd01dcd22d0176297d6175430fa516ff200949168c349dd3287388c2fac8c6a53e9e5236c3f7abd69c4e25ee316adc33fc524758c366de5", 0xbe}, {&(0x7f0000006b40)="cb022c0e8cc9d5e9040b2640571bb9bc16a078e91c527231831f8fb850ce5b5042e18f01e67060a5", 0x28}, {&(0x7f0000006b80)="66306839a7f1a4f3a53abffe2f851516889364c418eec978f80db7ace6", 0x1d}], 0x7, &(0x7f0000006cc0)=[@sndrcv={0x30, 0x84, 0x1, {0x1, 0x0, 0x8002, 0x400000000000, 0x4, 0x1000, 0xfffffffffffffffe, 0x0, r7}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}], 0x50}], 0x6, 0x800) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) r8 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r8, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:14 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x324, 0x800000000000, 0x377, 0x4, 0x3, @remote}, 0x10) [ 860.413956][ T9774] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:14 executing program 2: [ 860.487398][ T9777] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:14 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000), 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:14 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 20:13:14 executing program 2: 20:13:14 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 860.628598][ T9798] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:14 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fffffff, 0x200) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000080)={0x0, @motion_det}) 20:13:14 executing program 2: 20:13:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 860.712984][ T9805] hfs: can't find a HFS filesystem on dev loop3 20:13:14 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1bacf914c1bad3c, &(0x7f0000000080)=[{}]}) 20:13:14 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) recvmmsg(r0, &(0x7f0000005480)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000100)=""/33, 0x21}, {&(0x7f0000000140)=""/144, 0x90}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/12, 0xc}, {&(0x7f0000000340)=""/2, 0x2}, {&(0x7f0000000380)=""/131, 0x83}], 0x7}, 0x8000000000}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000004c0)=""/129, 0x81}, {&(0x7f0000000580)=""/159, 0x9f}, {&(0x7f0000000640)=""/193, 0xc1}, {&(0x7f0000000740)=""/117, 0x75}, {&(0x7f00000007c0)=""/151, 0x97}, {&(0x7f0000000880)=""/242, 0xf2}, {&(0x7f0000000980)=""/110, 0x6e}, {&(0x7f0000000a00)=""/168, 0xa8}, {&(0x7f0000000ac0)=""/110, 0x6e}], 0x9, &(0x7f0000000c00)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000001c00)=@ipx, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001c80)=""/208, 0xd0}], 0x1}, 0x1}, {{&(0x7f0000001dc0)=@sco, 0x80, &(0x7f0000002140)=[{&(0x7f0000001e40)=""/236, 0xec}, {&(0x7f0000001f40)=""/207, 0xcf}, {&(0x7f0000002040)=""/247, 0xf7}], 0x3, &(0x7f0000002180)=""/47, 0x2f}, 0x2}, {{&(0x7f00000021c0)=@ethernet, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002240)=""/216, 0xd8}, {&(0x7f0000002340)=""/216, 0xd8}, {&(0x7f0000002440)=""/203, 0xcb}, {&(0x7f0000002540)=""/12, 0xc}, {&(0x7f0000002580)=""/234, 0xea}, {&(0x7f0000002680)=""/59, 0x3b}, {&(0x7f00000026c0)=""/209, 0xd1}, {&(0x7f00000027c0)=""/241, 0xf1}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/245, 0xf5}], 0xa, &(0x7f0000003a80)=""/142, 0x8e}, 0x2}, {{&(0x7f0000003b40)=@ll, 0x80, &(0x7f0000003e00)=[{&(0x7f0000003bc0)=""/135, 0x87}, {&(0x7f0000003c80)=""/145, 0x91}, {&(0x7f0000003d40)=""/156, 0x9c}], 0x3, &(0x7f0000003e40)=""/49, 0x31}, 0xf20}, {{&(0x7f0000003e80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000003f00)=""/106, 0x6a}, {&(0x7f0000003f80)=""/4096, 0x1000}], 0x2, &(0x7f0000004fc0)=""/150, 0x96}, 0xfffffffffffffbff}, {{0x0, 0x0, &(0x7f00000050c0)=[{&(0x7f0000005080)=""/5, 0x5}], 0x1, &(0x7f0000005100)}, 0x8}, {{&(0x7f0000005140)=@ax25={{0x3, @rose}, [@remote, @null, @null, @netrom, @bcast, @bcast, @null, @default]}, 0x80, &(0x7f00000052c0)=[{&(0x7f00000051c0)=""/17, 0x11}, {&(0x7f0000005200)=""/156, 0x9c}], 0x2, &(0x7f0000005300)=""/84, 0x54}, 0x7}, {{0x0, 0x0, &(0x7f0000005440)=[{&(0x7f0000005380)=""/184, 0xb8}], 0x1}, 0xffffffffffff0001}], 0xa, 0x10040, &(0x7f0000005700)) r3 = syz_open_pts(0xffffffffffffff9c, 0x741980) ioctl$KDADDIO(r3, 0x4b34, 0x4) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000005100)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000005740)={0x0, @in={{0x2, 0x4e22, @remote}}, [0x3, 0x1ff, 0x1f, 0x2, 0x4, 0x8, 0x7, 0x3, 0x3ff, 0x87cb, 0xffffffff, 0x5, 0x7fffffff, 0x5, 0x1000]}, &(0x7f0000005840)=0x100) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000005880)={r4, 0x3, 0x6b}, 0x8) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 860.835529][ T9821] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 860.854177][ T9811] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 860.877831][ T9805] hfs: can't find a HFS filesystem on dev loop3 20:13:14 executing program 2: 20:13:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:14 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$sock_ifreq(r1, 0x8917, &(0x7f0000000040)={'bond_slave_0\x00', @ifru_settings={0x200, 0x9, @fr_pvc_info=&(0x7f0000000000)={0x6, 'nr0\x00'}}}) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:man_t:s0\x00', 0x1b) 20:13:14 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) socketpair(0x7, 0xf, 0x0, &(0x7f0000000000)) 20:13:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 20:13:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:15 executing program 2: 20:13:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000080)=""/164) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 861.120098][ T9843] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:15 executing program 2: 20:13:15 executing program 1: r0 = dup(0xffffffffffffffff) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x10800, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x6, {0xfffffffffffff000}}, 0x18) 20:13:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0xfffffffdffffffff, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@broadcast, @remote, 0x0}, &(0x7f0000000080)=0xc) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xfffffffffadf22ad, 0x20000) getpeername$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev}, &(0x7f0000000240)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', r1}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x3) [ 861.206152][ T9852] hfs: can't find a HFS filesystem on dev loop3 20:13:15 executing program 2: [ 861.312952][ T9859] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 861.320593][ T9870] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000080)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x76}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x7}, 0x28, 0x1) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffffff, 0x400000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x1bad02f, &(0x7f00000002c0)=[{}]}) 20:13:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffa) keyctl$clear(0x7, r1) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:13:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 20:13:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:15 executing program 2: [ 861.501604][ T9884] hfs: can't find a HFS filesystem on dev loop3 [ 861.568262][ T9898] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup2(r0, r0) accept$packet(r1, 0x0, &(0x7f0000000040)) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x109000, 0x0) 20:13:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000001, 0x40010042) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0x49, "16e196765f578feaf1a000490ef7cd045e4953cd3117ab26f8a8ea5690140ad48dc77389f3698b98a25788c155f36a2e3c8add905d6d1e0470c092ab2b4f3e12dfa0a3c130067e4372"}, &(0x7f0000000180)=0x51) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x4, 0x8, 0x5, 0x0, 0x0, [{r0, 0x0, 0xb2fb}, {r0, 0x0, 0x7}, {r1, 0x0, 0x6}, {r1, 0x0, 0x978}, {r1, 0x0, 0x2}]}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:13:15 executing program 2: [ 861.641436][ T9884] hfs: can't find a HFS filesystem on dev loop3 [ 861.649216][ T9899] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000240)={0x1a, 0xffffffffffffffff, 0x5, 0x3ffd, 0x0, 0x0, @link_local}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000200)={0x3, &(0x7f0000000180)="08c618d05d3bfa17c0b6d20d005fae12de1e68e6e2dba94ac0a5f1d79b142ad615d0600edc6d902db26bb8413c3517c99778ffeb0c746ec3341e46fe069a091f62cbedf8ac77b96fc1e21f11ee48cfc0407212ec2c35801e9b3258"}) sendto$llc(r0, &(0x7f0000000080)="9fdf37c92408c532fb0534165ff203af9a3730f4cda602b71fe7401569e195ca4a5287d128dda6df1f45beee7afd874dc47f759a2afaed5bef6795810b60e0bb9e19e065297408ffc7091f1921c3915bb4c0e3fad86c369eb74139f75087fe1cf5bc95c9fe4b3e0085276bc98ea67f0ac7b12aa53ee8b6f401189123f5b6d312f949d0dc56d15dc39e399f585082ea69841648e7adb1b2fd2d35dfc16f70f907ae68bd978e78c45bc5ab82", 0xab, 0x40, &(0x7f0000000000)={0x1a, 0x31b, 0x93, 0x82, 0x7fff, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 20:13:15 executing program 2: 20:13:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x1a', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$TIOCNOTTY(r1, 0x5422) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) [ 861.851967][ T9928] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, 0x0) 20:13:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:16 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x2d7, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$llc_int(r0, 0x10c, 0xf, &(0x7f0000000380)=0x3, 0x4) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f00000002c0)="321011902d55259ba29ab28f8b5f9da76057ee0bf892ee080f906320b61bcf4ed4594f9325224b9aff64df766eff1f7c8561c4630dddffbd18b0349892728634da79a2a29b1babfab0ca4c8b203fd40904e156df96eaf9144bcdc6339fe7b261ee8dfa65ba00f82685ec23fa61c55c3fdafb066dd0c77fb2d18b9486e89541e8cd42445de745c0ba948241758a33ece4db149b2214e9a4397866d6b160af6d357e5b96fde3a957212f910e169997a49b1cf0ef7909dfff1294fcd340", 0xbc, 0xdf8}], 0x0, &(0x7f00000001c0)='em1\x00') r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) 20:13:16 executing program 2: 20:13:16 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @empty, 0x1380000}, r2}}, 0x30) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='self@#ppp1&vmnet1\x00', 0x12, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000006480)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x3) 20:13:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 862.053165][ T9948] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:16 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs ', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:16 executing program 2: 20:13:16 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x943, 0x2000) connect$vsock_stream(r1, &(0x7f0000000080), 0x10) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:13:16 executing program 2: [ 862.225740][ T9950] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:16 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, 0x0) 20:13:16 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:16 executing program 2: [ 862.386990][ T9978] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:16 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2000) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10200, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x97, "26601cd5c07831ac788791dc7365c15aaae63363b10ceca8d5cc62c01824b15f6d22ec1d0356c1bdc8ae90aebe2b615e16aae81143f5808756e9d4552e7de8c6e67955c35d198091f836d5e45988376e9e91235693205fa819022557e7c7286f0ad099f70b1297e7f82da506aee8a4ba688aba0b67af05f7f7a576a6d9a79976e8d802bf5cf5f1db5a4dd1557e5db5db3225d3fa5dd266"}, &(0x7f0000000180)=0x9f) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x4}, 0x8) 20:13:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:16 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x100) ioctl$KDDELIO(r0, 0x4b35, 0x7) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:16 executing program 2: 20:13:16 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x0f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 862.479903][ T9985] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 862.589855][T10002] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:16 executing program 2: 20:13:16 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, 0x0) 20:13:16 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x3, 0x7f, 0x0, 0x0, @link_local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:13:16 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x42c00, 0x0) accept$netrom(r1, &(0x7f0000000040)={{0x3, @bcast}, [@default, @remote, @null, @null, @remote, @default, @remote, @netrom]}, &(0x7f00000000c0)=0x48) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:16 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:16 executing program 2: 20:13:16 executing program 0: [ 862.840575][T10022] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 862.873082][T10031] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80001000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="180000c5002a00000327bd7000fedbdf390a09000004007200"], 0x18}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x7, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f", 0x1f, 0x10000}], 0x0, 0x0) 20:13:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 862.954994][T10039] hfs: can't find a HFS filesystem on dev loop3 20:13:17 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='#! ./file0 #'], 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 20:13:17 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/11, 0x258) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r3, &(0x7f0000000200)=@abs, 0x6e) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) [ 863.096158][T10039] hfs: can't find a HFS filesystem on dev loop3 [ 863.099188][T10048] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000240)=0x1) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) mincore(&(0x7f0000ff9000/0x3000)=nil, 0x3000, &(0x7f0000000580)=""/167) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x10007, 0xc4b0f2d543cf1194, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) shmctl$IPC_INFO(0x0, 0x3, 0x0) shmdt(0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$VT_RELDISP(r1, 0x5605) 20:13:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 863.143229][T10063] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:17 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f", 0x1f, 0x10000}], 0x0, 0x0) [ 863.273567][T10073] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 863.340872][T10080] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800000000000}) [ 863.390101][T10085] hfs: can't find a HFS filesystem on dev loop3 20:13:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 863.524581][T10085] hfs: can't find a HFS filesystem on dev loop3 20:13:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f", 0x1f, 0x10000}], 0x0, 0x0) 20:13:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x20, 0x0, 0x0, 0x0, 0x14}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 863.577762][T10108] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:17 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x10', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 863.720742][T10115] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 863.860883][T10131] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:18 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010", 0x2e, 0x10000}], 0x0, 0x0) [ 864.174401][T10148] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:18 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 20:13:18 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x5, 0x62200) recvfrom$packet(r1, &(0x7f0000000140)=""/234, 0xea, 0x40000060, 0x0, 0x0) r2 = dup(r0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt(r2, 0xdd, 0x3, &(0x7f0000000040)="59e08f44b54aab6bc34dd75c035c69bf31f68e8b0eaea51b6e1d8d2015d287fe266216b12383690993399547a75de490e6962a274984835ae2329f2743daf244d192fcee70162af0189d0866b73be8b680d95100c9ca8d5f62eca34ee709c7534161e6e66dea2e6f6e3e23caee1fc1cd93b2b743acba918b025b791fd566922727d63dcd28e25b69f4a9c297c77e31e94dec3a3ade15df74e7dac863a7e57c", 0x9f) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000000)={0xa39f452376629b, &(0x7f0000000380)=[{}]}) 20:13:18 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010", 0x2e, 0x10000}], 0x0, 0x0) [ 864.456195][T10158] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 864.536772][T10165] hfs: can't find a HFS filesystem on dev loop3 [ 864.560601][T10160] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 864.572300][T10166] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 864.572713][T10163] REISERFS (device loop0): found reiserfs format "3.6" with standard journal [ 864.614307][T10163] REISERFS warning (device loop0): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device 20:13:18 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @window={0x3, 0x1}, @timestamp, @mss={0x2, 0x1}, @window={0x3, 0x3b800000000, 0xff}, @timestamp, @timestamp], 0x7) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x2, @remote}}, 0x1e) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x402040) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000100)=0x1f, 0x4) r3 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:18 executing program 2: socketpair$unix(0x1, 0x800000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r2 = geteuid() ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f00000000c0)={0x3, @default, r2}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x58}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 864.665031][T10163] REISERFS warning (device loop0): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 864.679013][T10184] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 864.697977][T10163] REISERFS warning (device loop0): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:13:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 864.702539][T10184] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:18 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010", 0x2e, 0x10000}], 0x0, 0x0) [ 864.785592][T10165] hfs: can't find a HFS filesystem on dev loop3 [ 864.839902][T10198] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) getgroups(0x3, &(0x7f0000000000)=[0xee01, 0xffffffffffffffff, 0xee00]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f0000000100)=[r2, r3]) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180), 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:18 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="de73ed1148fcaed33e3af3a14d"]) setxattr$security_smack_entry(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x8002) lstat(&(0x7f0000000000)='./file0/file0\x00', 0x0) [ 865.008067][T10205] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 865.017927][T10205] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 865.102399][T10202] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 865.121176][T10211] REISERFS (device loop0): found reiserfs format "3.6" with standard journal 20:13:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:19 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x900, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) getpid() [ 865.165035][T10211] REISERFS warning (device loop0): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 865.192659][T10224] hfs: can't find a HFS filesystem on dev loop3 20:13:19 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) prctl$PR_SET_FPEMU(0xa, 0x3) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001280)=0x14) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000040)={@null, @bcast}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000012c0)={'vcan0\x00', r3}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x4, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}}, 0x80) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 20:13:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265", 0x36, 0x10000}], 0x0, 0x0) [ 865.249274][T10211] REISERFS warning (device loop0): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 865.267636][T10235] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 865.291901][T10211] REISERFS warning (device loop0): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 865.312111][T10224] hfs: can't find a HFS filesystem on dev loop3 20:13:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x2000, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000001c0)={0x1, 0x3, 0x101}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e20, 0x100000000, @local, 0x5}, r3}}, 0x38) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000000)={0x0, 0x1, [0x8, 0x8, 0x7ff, 0xb1a, 0x2, 0x9, 0x80000000]}) [ 865.384402][T10239] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265", 0x36, 0x10000}], 0x0, 0x0) 20:13:19 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 20:13:19 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 865.526384][T10258] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1bad161, &(0x7f0000000200)=[{}]}) 20:13:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 865.621962][T10261] hfs: can't find a HFS filesystem on dev loop3 20:13:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x0) sendto(r2, &(0x7f00005c8f58), 0xeffdffff, 0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x1, 0x20000000084) r5 = dup3(r2, r0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000040)) r6 = getpgid(0x0) fcntl$setown(r4, 0x8, r6) fstat(r3, &(0x7f0000000a40)) [ 865.740842][T10261] hfs: can't find a HFS filesystem on dev loop3 [ 865.747375][T10272] REISERFS (device loop0): found reiserfs format "3.6" with standard journal [ 865.758434][T10286] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 865.775883][T10270] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) creat(&(0x7f0000000000)='./file0\x00', 0x4) [ 865.805109][T10272] REISERFS warning (device loop0): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 865.841916][T10272] REISERFS warning (device loop0): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:13:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265", 0x36, 0x10000}], 0x0, 0x0) 20:13:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfsD', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 865.936482][T10272] REISERFS warning (device loop0): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:13:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x40002) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x11, &(0x7f00000000c0)="fcac9de18a3ce242ab7c3382caa651609f"}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) 20:13:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x6, 0x5, 0x416, 0x5, 0x9613, 0xffffffffffffff01}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 866.004509][T10303] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000000000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000)=0xa8d7, 0x4108780000000000, 0x6) [ 866.142561][T10324] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:20 executing program 0: syz_mount_image$reiserfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfsB', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572", 0x3a, 0x10000}], 0x0, 0x0) 20:13:20 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x20500, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0x7, 0x8, 0x3, 0x4800, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], &(0x7f00000002c0), 0x4, 0x5, 0x1}) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040)={0x4, 0x8, 0x4c4, 0x49a}, 0x8) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f00000002c0)={{0x4, 0x8, 0xc86, 0x1200000000, 0x6, 0x8183}, 0x7}) 20:13:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x6, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000300], 0x0, 0x0, &(0x7f0000000300)=[{}, {0x7, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x108) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7ceb, 0x400) accept4$llc(r1, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x10, 0x80000) [ 866.319824][T10338] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 866.407169][T10341] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:20 executing program 0: syz_mount_image$reiserfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{}]}) [ 866.534796][T10362] kernel msg: ebtables bug: please report to author: entries_size too small [ 866.543988][T10361] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572", 0x3a, 0x10000}], 0x0, 0x0) 20:13:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 866.652253][T10365] hfs: can't find a HFS filesystem on dev loop3 [ 866.679939][T10362] kernel msg: ebtables bug: please report to author: entries_size too small 20:13:20 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x16c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, @perf_bp={&(0x7f0000abe000)}}, r1, 0x0, r0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x100) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x800) 20:13:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 866.740976][T10388] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 866.833903][T10384] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:20 executing program 0: syz_mount_image$reiserfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:20 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 866.922643][T10405] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000200)=0x32, 0x4) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='erspan0\x00') pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000100)={0x1, 0x1fc0, 0x6ffffffffc, 0x4, 0xfffffffffffffff9, 0x10, 0x2, "f5182fb878597b2a00e8ffe000", "25ac767dfb586ea355be9cf9535ad976811b2222"}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x1803, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:13:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572", 0x3a, 0x10000}], 0x0, 0x0) 20:13:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 867.103304][T10417] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:21 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x202201) r1 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = fcntl$getown(r2, 0x9) timer_create(0x7, &(0x7f0000000100)={0x0, 0x26, 0x6, @tid=r3}, &(0x7f0000000200)) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) ftruncate(r4, 0x1000000) syz_open_dev$media(0x0, 0x0, 0x103000) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x5, 0x2c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000080), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x16, 0x8100, 'nr0\x00', 'vcan0\x00', 'netdevsim0\x00', 'veth0_to_team\x00', @remote, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0x28}, [0xff, 0xff, 0xff, 0xff, 0xc028838758d591f1, 0xff], 0x70, 0xa0, 0x118}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x2}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x2, 0x3ff, 0x9, 0x0, 0x0, "6d320e092e93a16804b187a52a4cc425e1781dc489424f1dcaf919b7a5fb95af3e75eddf290edcc81e9decd3ff9f67a4b52e9c9fd731ff44b213c4151b3d8db7"}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x1, 0x869b, '\x00', 'ip_vti0\x00', 'yam0\x00', 'netdevsim0\x00', @dev={[], 0xc}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @link_local, [0x0, 0xff, 0xff], 0x70, 0xe8, 0x118}, [@common=@nflog={'nflog\x00', 0x50, {{0x8, 0x7, 0x8, 0x0, 0x0, "0385fe6561424dc2ce4e9dd8f996675866f972c4b1377e820662dd33f2fcb3a4e2941e9ddf575db158c69f2a9b8a5e945ece534e499cf68a42011a6daad6483d"}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff}]}, 0x338) sendfile(r2, r4, &(0x7f00000000c0)=0xf10001, 0xeefffdef) close(r2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) 20:13:21 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7f, 0x200000) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x80000001, 0xc9, 0x3f, 0x9, 0x40}) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x48d) 20:13:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:21 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 867.226395][T10424] hfs: can't find a HFS filesystem on dev loop3 [ 867.244833][T10428] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:21 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) socket(0x8, 0x802, 0x9) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 867.313870][T10442] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265497345723246", 0x3c, 0x10000}], 0x0, 0x0) 20:13:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfsP', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 867.470242][T10457] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:21 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) write$P9_ROPEN(r1, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x2, 0x1}, 0x1}}, 0x18) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:13:21 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:21 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xab, 0x3, &(0x7f0000000180)=[{&(0x7f00000002c0)="64981fdd57deaff818a1612b4709f09995b8168218b9a9069f3b1600b703dbd15241a73991ea1e77b7cca36541f8accd92a91810360baf685a58e3d92f8c751fecf0622a29b8cbe735b1421bd929ed6ec7cf2f68537aa83ed3251b67e9d3a1b8a8a540f309bb844f30055d9e63ddc5fec820f82250eb68fdda520f05ec10054349a4e77aa37b7cbb8d62271392c74890d24702ccb4d2fc6cec31c233bc7ae10550e08eac75f0ea3001bc59605862c333d0fd2072655e1bc23207fde95b7635200d7233989faa243fb6289b", 0xcb, 0x100}, {0xfffffffffffffffd, 0x0, 0x1}, {&(0x7f0000000080)="e5a9f7aa169e93a21d30fdb164246b4b457800f9c236d70b1bc8b7f3cb422c3d144b8ea90f66c810de3bb2efd70250e80d687d042c80d313d63ef018f7674576357447f9230a838f6d3e4c4701c24d33aaf9e56a0abc8ea9ed298873768ea79fb293c120cc895fa0eb", 0x69, 0x10000}], 0x20010, &(0x7f00000004c0)={[{@sysvgroups='sysvgroups'}, {@sb={'sb', 0x3d, 0x7f}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xffffffffffffff3c}}], [{@obj_role={'obj_role', 0x3d, 'bdevwlan1*['}}, {@obj_type={'obj_type', 0x3d, '}'}}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'wlan1'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_lt={'fowner<', r0}}]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 867.707262][T10468] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000000000000f000000529a00000500000000800000ffffffff3c000000b9043e7a0000000000000000000000000000e900000009000000ff7f00000000000000000000000000000000000000000000000000000000"]) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000001c0)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000140)=0x3) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000180)) 20:13:22 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfsM', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:22 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265497345723246", 0x3c, 0x10000}], 0x0, 0x0) 20:13:22 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x80000001) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c4609037f46010000000000000003000600060000006d0100000000000040000000000000007500000000000000010100000100380001003f000000267700000000790b00000300000000000000f56e0e7800000000e09b0000000000000200000000000000080000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004440468500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ec3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000af00000000000000000000000000"], 0x978) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/bnep\x00') ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000180)={r0, 0x7, 0x3, "cb1f1baf36f00536e508c9b975a6f9d9252322a8b9d34d16e41d2c34445629797ab69bff1fa6f873991dc06788bf6f3baeef164449b0e8426da337d3a9e059fe30ca4dd3b0735e0fcf4770769e"}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000f00)=0xe8) fstat(r0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$tipc(r1, &(0x7f0000001400), &(0x7f0000001440)=0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) r7 = geteuid() fstat(r1, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() getresgid(&(0x7f0000001200), &(0x7f0000001240)=0x0, &(0x7f0000001280)) stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000001380)={{}, {0x1, 0x4}, [{0x2, 0x4, r2}, {0x2, 0x0, r3}, {0x2, 0x2, r4}, {0x2, 0x6, r5}, {0x2, 0x4, r6}, {0x2, 0x3, r7}, {0x2, 0x6, r8}], {0x4, 0x1}, [{0x8, 0x1, r9}, {0x8, 0x4, r10}, {0x8, 0x7, r11}, {0x8, 0x2, r12}], {0x10, 0x1}, {0x20, 0x3}}, 0x7c, 0x1) r13 = dup(r0) ioctl$UFFDIO_REGISTER(r13, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x2}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000080)={0xcc, 0x6}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r13, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{}]}) [ 868.146811][T10512] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:22 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000000)={0x101, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e23, @remote}}}, 0x108) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000180)={0x7fffffff, 0x76700000000, 0x1000, &(0x7f00000002c0)="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"}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) splice(r0, &(0x7f00000001c0), r0, &(0x7f00000012c0), 0x9, 0x1) 20:13:22 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000140)='GPL\x00', 0xffffffffffffff82, 0xa0, &(0x7f0000000400)=""/160, 0x0, 0x1}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000014c0)=0xe8) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000540)=""/136) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x13f}}, 0x20) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000003c0)=0x101, 0x4) r1 = add_key(&(0x7f0000000600)='encrypted\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)="485936e20d270ce2b741ce6706574488a9f405cb1fe1aad632f8044895c793f70166834a0ff650e30c54ef5c1960df4253ddfb110572bc0f49ed3e54c8", 0x3d, 0x0) add_key(&(0x7f0000000840)='.tead\x00', &(0x7f0000000880), &(0x7f0000000980), 0x143, r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000700)=[@in={0x2, 0x4e20, @rand_addr=0x4}, @in6={0xa, 0x4e20, 0x4}, @in6={0xa, 0x0, 0x2, @ipv4={[], [], @multicast1}, 0x1000000000}, @in6={0xa, 0x4e22, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, 0x6}, @in6={0xa, 0x4e23, 0x5, @local, 0x95}, @in={0x2, 0x4e22, @dev}], 0x90) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000bc0)={@sco={0x1f, {0x7ff, 0x9, 0x0, 0x9, 0x0, 0xab7d}}, {&(0x7f0000000ac0)=""/228, 0xe4}, &(0x7f00000008c0), 0x6}, 0xa0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x66, &(0x7f0000000900)=ANY=[@ANYBLOB="aaaaaaaaaaaaff81b7776fd49ce33d8517ffffffffff0800450000580000000000019078ac1414bbac14141105049078000000ac14142800000000000000002300e0000002b9a5bae0e000000100010000000000007f0000010000000000000000001e01c62580f449f700000000000071f2ec1ab365240832e80700e31123cfb27336c88495eeeb63d61f6a9a0ebe149432b06dd66476e3301420bf910332e1f86b0ab61a5782374c8867ee9ad95a5452e37593d638c7f0ca25f5e70d3594dd989729"], &(0x7f0000000000)) getpid() capset(&(0x7f0000000200)={0x200f1526}, &(0x7f00000002c0)={0x2, 0x5, 0xc3, 0x400, 0x0, 0x7}) mknod(&(0x7f0000000a00)='./file0\x00', 0x461, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000006c0), &(0x7f0000000640)=[&(0x7f0000000240)=']\x00']) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180), 0x4) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPIN\x00', &(0x7f00000004c0)='keyring-)em0[vboxnet1security\x00', 0x1e, 0x1) [ 868.271910][T10518] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 868.338594][T10536] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:22 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) 20:13:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265497345723246", 0x3c, 0x10000}], 0x0, 0x0) 20:13:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:22 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfsT', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 868.503454][T10549] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:22 executing program 2: mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x1, 0x0) lseek(r0, 0x0, 0x3) creat(&(0x7f0000000000)='./file0\x00', 0x62) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 20:13:22 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000100)="6d358da0db5dca0f73845ea9d8ecae73e34df425246ff8f4477fc859a7a1", 0x1e, 0x81}, {&(0x7f00000002c0)="bacb5df3969932f0644c0227651dc52bd25758c84237d63eca142175bbc6bfd1c1e9bd801b1678bc5a2a08553f359038435d5c66811971b57327201fb83ee93b449e6ba831c2ff7df65492ee676d65ff485ce505d1287938c81890ecbf45c76ee4a23a1874467b72b27057b739ded5cad924ce0f4cf2d6cb7c60841435e3ce0dd8d843c944aa0307928630dacc98b2322e9e5364aceb023cbdf059ec1c3c8637a164b09e3bf38beb713c87fa6530ec8e14ba7775c0bea63153171147dcb521605c19c0c40a145f6c0b3fd3691046914b6fc574dd64e84dee90dc016e7f5bc1d88fe052196c6781f5ee2d4bc1d48dc65c62bc", 0xf2, 0x1}, {&(0x7f00000003c0)="944532f0fcd85fca6f3563b412a507e645cb07624e35f4476d37b9597c5c99edc8e3f8c7c92f353bb924f57eadb9d7f6d250d0e3b7d50f8bdf19d06adda48c2ad7b1879dcf3848afae472c39eabfcfb74766b97654a8fa127758443f750ec338fb3f600e70ce7a93969aad7c1fbe4a133819d3615710eb885d77b911ec892a5b61bfa264a109f2573361ca0220f4cb779892af9dd7f5433604516ecc2bb211e6ca1a249e972aca37fedbcfd130d891af0f998f8b9a10ec851d03d0cb751c151cfb182f307849f970c0a56d916cfd2c4ddaa8ab834cc85b05dafd8a819681ddff947c13265a53877c6a2f6070e2e3dfd1abae", 0xf2, 0x4000000000000000}], 0x400, &(0x7f00000004c0)='/\x00') r1 = dup(r0) getsockname$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) 20:13:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 868.595283][T10565] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 868.691167][ T26] audit: type=1804 audit(1547496802.707:73): pid=10572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir814367063/syzkaller.WBWdbU/1103/file0" dev="sda1" ino=16701 res=1 20:13:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/rt_cache\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xfffffffffffffffd, 0x401, 0xc145, 0x8, 0x6, 0x0, 0x7, 0x9, 0x300000000, 0x11b}) r2 = socket$inet6(0xa, 0x8000000001, 0x8010000000100084) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @multicast2}}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000340)) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000480)={0x2, {{0xa, 0x4e21, 0x200, @empty, 0x3}}, {{0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x10}, 0x2}}}, 0x108) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2, 0x1012, r0, 0x1) write$tun(r4, &(0x7f0000000280)=ANY=[@ANYRESOCT=r4], 0x1) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f00000002c0)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x8f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0xb) close(r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000640), &(0x7f0000000680)=0x4) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000006c0)={0x0, 0x1ff}, &(0x7f0000000700)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000740)={r7, @in={{0x2, 0x4e24, @remote}}}, &(0x7f0000000800)=0x84) setgid(r6) setgroups(0x4, &(0x7f0000000600)=[r6, r6, r6, r6]) r8 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x8, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000080)) dup3(r0, r8, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x0, 0x40}, &(0x7f0000000440)=0x14) 20:13:22 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 868.745603][T10564] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 868.777916][T10580] ceph: device name is missing path (no : separator in /dev/loop1) [ 868.820805][T10587] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 868.851541][ T26] audit: type=1804 audit(1547496802.717:74): pid=10568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir814367063/syzkaller.WBWdbU/1103/file0" dev="sda1" ino=16701 res=1 20:13:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d}], 0x0, 0x0) 20:13:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:23 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 869.043490][T10593] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 869.083526][T10604] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfsS', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:23 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) chroot(&(0x7f0000000000)='./file0\x00') syncfs(r0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) [ 869.106893][T10614] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:23 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d}], 0x0, 0x0) [ 869.311424][T10624] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:23 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 869.365172][T10624] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:23 executing program 1: r0 = memfd_create(&(0x7f0000000140)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\x1d9\x03\xc2Vb\xe8*l\xdcC\xeb\xa6\xe4\x12$\xd1\xa3zz\x85\xf4\x1e\xcc\xfc\xf6\xb6__\xca\xef\x1b\x9d\x0ePw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os\"\xfc\f\xfa\xfe', 0x0) preadv(0xffffffffffffffff, &(0x7f0000f85000)=[{0x0}], 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r0, r1, 0x0, 0x7ffffffe) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r1, 0x7fff, &(0x7f0000000080)="103a23a57ed39ca0d2ec5edce4525d895e34aed5992128d1d546dd93d08aa9e35463b6ffd7f5d94c4fb39ae3e373d668f397b84aee87123ae2a2ad8331cca9a86579b98192039772261c03adf74b69a0a940fb58d55309f48fbf36771746e8ce8673b3520e0643221e3ed0f16068387a8dd1ef") ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f00000002c0)={0x7, 0x0, {0x55, 0x1, 0x2, {0x4356cb79, 0x1}, {0xac6, 0xee}, @cond=[{0x5e8, 0x5, 0x800, 0xb328, 0x1, 0x100000001}, {0xd75, 0x100000001, 0x20, 0x0, 0x800, 0x1}]}, {0x54, 0x3, 0x4, {0x8, 0x100000001}, {0x3, 0x1ff0000000000}, @ramp={0x800, 0x3, {0x80000000, 0x4, 0x7, 0x3ff}}}}) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 869.424354][T10629] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 869.551628][T10651] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 869.561396][T10640] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r2, 0x0, 0x5, &(0x7f00000000c0)='aead\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffff9c, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, r2, 0x0, 0x11, &(0x7f0000000140)='morus640-generic\x00', r4}, 0x30) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x9000, 0x0, 0x0) 20:13:23 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="08002dbd7000fb4b969628b2e486b7000100080005000300000014000300fe8000004045bb58f7c8d70793494c756e0000000000000000bb0000008d874b87dd9660973bceb87137b3aece18c05f4716546de6f947951d28c35d5eb3a01cc74958"], 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x44041) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000440)={@caif=@util={0x25, "d8309a49d20d84c5a7e645ec0dcd6448"}, {&(0x7f00000003c0)=""/99, 0x63}, &(0x7f00000001c0), 0x42}, 0xa0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={r2, r4, 0x192000000000000}) 20:13:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:23 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d}], 0x0, 0x0) 20:13:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:23 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 869.825899][T10668] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 869.855580][T10662] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:23 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f0000002440)="64fb68a7bc88aed10489cf900af10ef4f20dc0ba1e44e07a28b99bd72924b83b662893fcd12118ae7acf03cd49fbd0eecf01f6e5acb5adead19764d3ead576aea2e6996e9d240f7897e338d3c07fc6a9fd79ff6cf01e256ef3f738d6c6d7d3367c3a3cf643b019cc2ad7944a9cea2c90b4d2083841208da073ca44bee293fd68b2ee934fb2b805a4665a46f845274cfd7e9ca3b719251caf8c6702ef780abfe9e140cc923a15fc4b565fdf2fc2318f88756d8197f9090695ed72b3183d0128ccf934a0d75ff2478fa2518aab037b4e81f29e7023087174b400d6fb8a0c6f30ac00eca9a13ee9c831963388a1c2295ee1f738fe6b2152474fb69d5b2e7060519d15988f1c258a0755ae2f620af52aa3f78f146422cb21161323921d4784dedeeb0c64b063ecd600c9d549df441d39d00b520be7c6629e7abadcd67f394f3ca17c8677627dbf08e3e78556d997558c98a2ecb2d9a3a4a2b909a1fe90571ab9fb47f6b658d15c7fe75ece177cad693773e542968bcdc7c7a93623f7c56a4cf3a54a13e67de4320ed6123236f538e724d19f3adc1af28ff7735d9c2f314d8b8e73c16cfd584369eb34716334a397d70b8c16cf3f254936fabe5056b4af18084c702cc7a9299bac381a0fd017e371ffa748d4b497eb66efffdc838fdcdc9b60db6c15fcea2ffa8147dfb8b9285ad7a58f75a32609d0874a2bc8d80695d4de7cb472a7d3ee8e4bb72c7ae523ec8e08121c083e0368db351a07c8e8ee6417ac78e198132f8f0337024f1f90b211a1e1a068a49ec026b1418f9a07345527d6c09a9b4f978aa41425d2ded16e3af64dca82f7ea3c9f83881cc5739054d671a355cd5a8d4e8f0caf72f29247efabf716494dfd9e5459952b5274be93718e9a4829aeee55b67177153dfa0f176aefa5d22272d90dd6925defdf75230527c50f651ce2754b09cb2a9ae0f9a7aa960ae00d5dd37385d34ab7179f6f0a41d402f1cd5138713b6b6948618e5927689c261d8b824f8486ad230a5a4368d610ae5a6d020f01b47a510df5b7780763ca2041726fd90313ca0064afa2359fe8a126b1ff4fa6d4232c185a402eed37d792cac77f9f93c75df53e3a0d038a970d8b5a15e61d1d91878989d5fc71e1ca08797c002b654078711639eb8f824ac7a4a1aa3cb68cf062920615c1c99826f68f7002bf6296066c9a88f838c890dc5769115a10fc20acab7a30e9a7c1d6d06b7b10ec8346d1f4f3e3f21d6bb597b6c8a1c1a9f9a121b941dd12037725b742659850b0b813782715bb5305195e4e1506cf59f6ae0cdfa22dc5e4f49cf5fc6a9a52f98460154b069968ecad878b327dc77ffe842e5f6da600bf255f77ee5ad1a81109d12b1dabc8992e28943cc6c848ec283ee54a9055ff68911b127bead204798cced518a660a75a159af73540048e8b3999c059299741793ef0e4f2f4a716933b18d2743d8dc3674021855bc32b635f9a27e97e7797a8e0388abce863a9b0c2b11d5c72f8571dc5da5c3d21c16361e1a78b0959dcc6c61be586132307890492a65d5ad2968d3280d7362d1f9250e351be687797944013badf425be7c6144709d14e34469f0532c9b4b8335282f6f0d83463ff509af34ad68bf622ac6fec9906e83174ba9b82c121e67bd229286647dc6ccca6d78ed312c26453deac2e8320f3d83e93edfcd6619a180184782511c1de2ba7d0f6046b196127b77cba36fe24100f6ea97b44a9bba39f147ff4a241cf8f3b82976b73465ab7eee5990b5203c35804922d8a1cb2c7d87567ad706bc947277fb394e47ec2421da51f6621d020fe3536d0a3a067876ab4ff123b9c09931621d4101ac4418ec635a2ac8bcebd52858bc8374e060af9e62d66e5aec643a61187d36077c9740859d13f2b6a33d9396ac4abc8cd7bc9b6cad9e6e5ebc2c65029ec33cd0f59223c6256acf0916d4e7f88bae3892ff637270771b01d7c69eb51ac55952c641a63bd96ba533e8e2fc364c0f951b1632ab6da6cbbecc5e1b12fb9b33ea8926e2b478ce45428fc3d9bc24e5dd74d6e8c086e9440ad4b5c8ba63c0bdb8905324e900da982dcca02a9454ef57d3def172a17c8f95efc5444233151edc7c6d2b9684a9dfeeb98b6a28ba4ace4a667e0eb3baae49b5b150bf4fff759680a93b1fa413a69bfe08dbd6904a36cd5649a210413a930855cab0953a6f2544ee77d33bafe030e0e872ada5e8929f7db3b282aa53b386f0a28f55d37e95296053eaec9ad81de5b096178487960989847209d56a8781e291c626e6c3761aa3867c5a45d6b21f6120a2f09c9cad7df69dce4640406424ce7e5a4a377314c5598b1df23e1cd08a78edf074049a94510ef5c770263bc39919ffc6c06e0129b145d72f19e5c7180827116915f4f92244568845a0b40f17cf65142ffe8fc3b334b5a9c026504b8790cbc8a561bcfeca59f1c3fc5062048824f1fefa64352bb8314acd83a79ed953f723794fe542c3c3fcdb2a0ee67c40b12cfeaf276f1921eebf4aff7467404cc5f20d11488ccb40bf3c1133486c3ca7df75ebf68e9a12d7b7a5ce3d144e83d11cb59f88e42e229b52eb48f41f2fa181449e68362860edcf1795ef7ecdd3542adc9b2263e59532c6bc66a77abc111af7ec9c217daf7423c565a5d4340f7389d9123e2d7e0f6e9cc62e06fa051ea8df7e16c39078dd35932ca369cfb74010c897d7dbf2e1b0467e17280fdb9741fca83dbad1a474f02ff09a71e3ca75a30d412a0740c6e25aa3349872423e7bdeabb1264cb52c29c80c53888fde9f03052d5d4f6bc56dc362dc1ae4d64207f28ac5c87411bcfb9ac1cc3694f755f83a56fbb3d4850f3ff3c6c0f2ea467d9a9d93c54dcaa2cf9c675222e1890fd381f6404191d9f77cebcafd428204cd12a9c426672bb91b1b348cd51248e0269ca0f82c08f325ebea4a91cf490dd385604621620d4f5e694a724fb3888301f336ba3a66b09c31173453bc786b75fc9b83f31b05527d341986168c9c9feff11112e4b63e66cf54ad9dfcd0cd9ee9ca560ed0f3e8132a15c71b09f41e49956a1c67b91a56494bd7c3d17425b33c5ad80b2b3d0b672041a9805a7998da52e5fbcaea8285fb0573a8e04a2787e3954960fe6cc0654db0f301c02ed55e88642cc91a8c279903608e42ec639bef9fe2bfda04ea1475c5248e8df26c520a70e0d2b8b32c925856af8446ce6be47ebf9715c1b2e984151ae164a1d5090ef6c424c22cab8c54b9b7899c65d2d9e1057d572c13dd565bd7a6f450b9a95c911bb97d16354982cc79fa76b2b359d6d3e9ee8211133a2850ad488e1d7b5aedd934f5f474b614c03dc9c8f0d6a3559cb3c224f64c470ede60c910e3014d5e05d38b1b918d54bbd6837782459f432616976f0957d0af3d22462d127b0eaeda89947b6ad066a170144be5326bf436db66a3fe1230e4f845555bc839f7ca90763c07ac96910b726dfa99fadebb5b1e44a2be5f3e0d19a25272553e9705fd504501b7d6fc175aaf06d290dfe8c78a053fedacd4bd152a5ac014813641e2ee95167cec6915230f5333c4a164868dcc6659e55e1250ff07fab89eb3e4450eed4f2872d0e49ea03187a57d6f27125c0b7be2abfb69a9f8cd446eda08335568afd91afef3a911c0efbbe26c6951050443cc7f072003e7d461ec874175473fb2eac4604571a5a6252718692262b7990c52a28a8ae19005f8eebb33af6dc19f16cb8972e1f415f5067f4c1a90c4a11aa2bcf8ca49c0c0ddad964a7755aaa9deae0eba6e6aa36c715238073bee2a623605a0fa89151b53c478b3fc01b645bde281ba5d715da657769542d82f0f9fc288c638e1c4c9e880080c9da7065105af4d5bff74946b2f5aff2e0e2ab5372883a5666aaafe31d27565d5e1b0bdd7c678f302ed512049e1bb1e427f46b2792ed78f9dcab2668aa29f95700b0a8e60d00884d8374cb0c37e286546ead2d54b14bee9c8b7cd895ffac479e8112ff465e2bce8155ddbaab7fa73cdc6b1e7c086731ba3d3bb9c3ca6ee939bc19ae495f6d23e8583824628d10190f4ba9d25191999dbf6b409b93044c4213cbbe6d9f1fd477d98fdae37ab9981a5c4c8159a478869154b3b7cae6353f7617d111a4ca266786ba56b5c56555b558a4de3d2efcd43df951081515881424491fe9265623f9c8b72f05380fbe8525a1158393ec8cc3f800eaec9250ffa351fcb4dc2dc51b68fd8a0a58a1396e7a85504119561598d89d887e4ecaf158b3bca38a2cfcd3b5d0b644afeb405353492bd4d55dc7751d509ccf8d4e749c8b7c437f3ebf33ac4ac0e4168df5a3e30ee7e27393090e27905285baec3efe67bef7f22bc358ee93d452a89abb4e728fcdf3126e6dbd49727f28545cb74721a8dc9479ca798f81181fc51bcb4fe8278c219291003b6ab24ceb9375b68cc41f9ec2b86e3528ffcb545b3ccfdeeead403222c013962d17e439c57512469d9a47990d3a7032bae921c84645fcbbe8dfb0497ad570d19326cccfca91bc77d6fe927db5d756f4d5eafd05a21428b0f47fb55b1adf2e7fab715aade949244247f52f61b76d9f2500a46f462782a012f157a52a7f1ee5b14c1cd1ef6e28b30e3535272ddd0a86922a1b7dfd8bf2823a725f3970d803ea83b9adad70929777d9a509fbe8e5a4ff671b609d889181ab7af8a9f44bb165e2bbe993edb69d43bc0ca2f183c030ad70e3f45de47f8da0ac798fab3548ad71eca11da33a99e747dbe3f022f92273eb1b69cccbd85550fb90e38de61c33ac7ab02baea084ed40b1b394c52b934df4cbbb8b573c1a5a33f893fe030f38ebaafa9bf58997acf8a90c87be7a792a18c7226c5a35ae29e37f23a0e0c7f27701458ce1ad0f26079ed0ae76b6f923997414e8bea98dacd5162f38b4a4d00f22f50ac6f1653f7ebd4e971ab2e81c351a48606622424b6adffaccbdc1fdd122d8aa1b5087fb7281fd14bfad14f5c5a9228b5fbf95fc825dc09b16d6af6d65ebfb8c8392632a71684a7ad2c8ebd4438874c284fd4c096ce003d0695a4fa6dfde19b96d0a4514ebaf4c294b898196678bf9f36f036197981758081e9bcec765442af13ab5feb1fc4a727c572a282bc8599d8efb691576cd1977f06a9e8c8bce31764c6b9fbff0c79441f5a5edcb1e310183a8b0f0f9efeae24dcfae25c74189680fa235d73f4f956663abacb8b3803d0277f7e29c255e4d782b814b51a7430dec09f80cda90da187e21a90cd47f5827e99b5396be565a3c913f2764ec7ac59f21afba06a6e9fa133ff9c0a9a5ee4068efade5ad79fc1a640bd318a0965c683d0973fc4f5930a3a46fde035e9819bce5e48b8242e593494459bb69fcd575f39c61cf9028234f2c8b2cd24e856cf868b164d98638156e6eec8ffa78e054f9e38ea2b37cf87bc78ded1a8dc3dbeda5f556e5903045b95bf573acec9c73ed0cb57911d4b4aeb36906c730d1aa03fc8d7207fcc04829cd7a48fd6eda659a8a01ca7591e5edce247b890988e1783295c9195cf16a06db50641cd2775168c4c7254d340e92ace382d898eb136a326a320c283f50a5ba33ac79e5f04b5832432b734b2569cf3d4302881113c927349766060f7ce328435da6f1d472a49cb70d3f441d48ce46e905fbc17e7fd817803ff1326ea486c23140372e9a2cb93da4f14fa1da58e0486f86b111047c2412259519c1752f5f76ce31fd831423c710bfcb510f1a0172c5389268ed321af2cf7263206eea078520791dd5f8655cc3e1761e958fed7377553fc6b7d2bd052941e394156f4244f5c4f5c8625ac15aaadc8b6eb974b85b20ae09a2c7b66fb521c1e1611d0f981438a7d1370bb99217f41ac559afa823fec34e72ddef5aae284bf263d7885710ae838767367ff28a9d8e685cf8e7cf4fc1193c386f2a44fadbe1b786e13197af5dfd62f54e57b77e1ef53d1a7384fa9cc901468f7e460b5c79797cb156b203c9dd527a1ba3180af1e7e77a5f70bae80ec2edcd38c835d4e849902ca5a0590aa700d5a37cc611c6a79ad946e56dbee1f4c798bdf405a7bcfedc9250cecb56328222b9810af050e7b01f2c20f74769e7b4ec63b0c0c8207523a71496076c951184cf29f0ae6e1a8c5dcfb90f01b121df0e43749bed746fa4d28beb486c44e179f07dac4cb8f1134ff805ff3139ae3b238775599de6a3f1eec9718abeb6d710acf9e3c8d0f48738fe32efeb65a87ecf21980128000484153d3903a2068d6601efd56a213c156680006e2465507faa94977c384d80113a54f86cd5dc043a2a10ec1eddae01a2118930e52e252164fa233d782531c71c63177f0e0efc673e932c7c4c6a87e683015d298848cde23943e5227f696f") r1 = dup(r0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000240)={0x1bacf914c1baf27, &(0x7f0000000180)=[{}]}) [ 869.889181][T10671] hfs: can't find a HFS filesystem on dev loop3 20:13:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 870.045810][T10692] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:24 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1bacf914c1bae1b, &(0x7f0000000200)=[{}]}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) write$P9_RGETLOCK(r1, &(0x7f0000000040)={0x1e, 0x37, 0x1, {0x2, 0x7, 0x6, r2}}, 0x1e) 20:13:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 870.130540][T10671] hfs: can't find a HFS filesystem on dev loop3 [ 870.157489][T10680] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:24 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 870.255803][T10705] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:24 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 870.328194][T10709] FAULT_INJECTION: forcing a failure. [ 870.328194][T10709] name failslab, interval 1, probability 0, space 0, times 0 [ 870.358748][T10705] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 870.360542][T10709] CPU: 0 PID: 10709 Comm: syz-executor4 Not tainted 5.0.0-rc1-next-20190114 #11 [ 870.376776][T10709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.386835][T10709] Call Trace: [ 870.390138][T10709] dump_stack+0x1db/0x2d0 [ 870.394476][T10709] ? dump_stack_print_info.cold+0x20/0x20 [ 870.394504][T10709] should_fail.cold+0xa/0x14 [ 870.404801][T10709] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 870.410614][T10709] ? ___might_sleep+0x1e7/0x310 [ 870.415497][T10709] ? arch_local_save_flags+0x50/0x50 [ 870.420803][T10709] __should_failslab+0x121/0x190 [ 870.425756][T10709] should_failslab+0x9/0x14 [ 870.430262][T10709] __kmalloc+0x2dc/0x740 [ 870.434527][T10709] ? strncpy_from_user+0x4e0/0x4e0 [ 870.439683][T10709] ? fput+0x128/0x1a0 [ 870.443680][T10709] ? do_syscall_64+0x8c/0x800 [ 870.448360][T10709] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 870.453886][T10709] __x64_sys_memfd_create+0x13c/0x4b0 [ 870.459240][T10709] ? memfd_fcntl+0x1870/0x1870 [ 870.463991][T10709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 870.469435][T10709] do_syscall_64+0x1a3/0x800 [ 870.474030][T10709] ? syscall_return_slowpath+0x5f0/0x5f0 [ 870.479648][T10709] ? prepare_exit_to_usermode+0x232/0x3b0 [ 870.485354][T10709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.490887][T10709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.496754][T10709] RIP: 0033:0x457ec9 [ 870.500736][T10709] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.520331][T10709] RSP: 002b:00007f82d85b2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 870.528722][T10709] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457ec9 [ 870.536685][T10709] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bce80 [ 870.544636][T10709] RBP: 000000000073bf00 R08: 0000000020000218 R09: 00000000fbad8001 [ 870.552594][T10709] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f82d85b36d4 [ 870.560551][T10709] R13: 00000000004c6679 R14: 00000000004db7d0 R15: 0000000000000003 [ 870.624093][T10714] hfs: can't find a HFS filesystem on dev loop3 20:13:24 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$xdp(r1, &(0x7f0000000180)={0x2c, 0x0, r2}, 0x10) 20:13:24 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{}]}) 20:13:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:24 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 20:13:24 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 870.690109][T10714] hfs: can't find a HFS filesystem on dev loop3 [ 870.749033][T10725] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 870.761968][T10730] FAULT_INJECTION: forcing a failure. [ 870.761968][T10730] name failslab, interval 1, probability 0, space 0, times 0 [ 870.776778][T10730] CPU: 0 PID: 10730 Comm: syz-executor4 Not tainted 5.0.0-rc1-next-20190114 #11 [ 870.785818][T10730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.795898][T10730] Call Trace: [ 870.795924][T10730] dump_stack+0x1db/0x2d0 [ 870.795943][T10730] ? dump_stack_print_info.cold+0x20/0x20 [ 870.795960][T10730] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 870.795981][T10730] ? print_usage_bug+0xd0/0xd0 [ 870.803609][T10730] should_fail.cold+0xa/0x14 [ 870.803635][T10730] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 870.803660][T10730] ? ___might_sleep+0x1e7/0x310 [ 870.835423][T10730] ? arch_local_save_flags+0x50/0x50 [ 870.840730][T10730] __should_failslab+0x121/0x190 [ 870.842468][T10727] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 870.845698][T10730] should_failslab+0x9/0x14 [ 870.845715][T10730] kmem_cache_alloc+0x2be/0x710 [ 870.845737][T10730] ? shmem_destroy_callback+0xc0/0xc0 [ 870.860536][T10730] shmem_alloc_inode+0x1c/0x50 [ 870.875480][T10730] alloc_inode+0x66/0x190 [ 870.875497][T10730] new_inode_pseudo+0x71/0x1b0 [ 870.875512][T10730] ? prune_icache_sb+0x1c0/0x1c0 [ 870.875534][T10730] ? _raw_spin_unlock+0x2d/0x50 [ 870.875556][T10730] new_inode+0x1f/0x40 20:13:24 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 870.889555][T10730] shmem_get_inode+0xe1/0x8d0 [ 870.889576][T10730] ? shmem_encode_fh+0x340/0x340 [ 870.889604][T10730] ? lock_downgrade+0xbe0/0xbe0 [ 870.898492][T10730] ? lock_release+0xc40/0xc40 [ 870.898508][T10730] ? __check_object_size+0xa3/0x790 [ 870.898541][T10730] __shmem_file_setup.part.0+0x7e/0x2b0 [ 870.928366][T10730] shmem_file_setup+0x66/0x90 [ 870.933059][T10730] __x64_sys_memfd_create+0x2a2/0x4b0 [ 870.935361][T10739] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 870.938440][T10730] ? memfd_fcntl+0x1870/0x1870 [ 870.938461][T10730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 870.938488][T10730] do_syscall_64+0x1a3/0x800 [ 870.962115][T10730] ? syscall_return_slowpath+0x5f0/0x5f0 [ 870.967760][T10730] ? prepare_exit_to_usermode+0x232/0x3b0 [ 870.973523][T10730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.979092][T10730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.984990][T10730] RIP: 0033:0x457ec9 [ 870.988893][T10730] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.008499][T10730] RSP: 002b:00007f82d85b2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 871.016910][T10730] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457ec9 [ 871.024877][T10730] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bce80 [ 871.032832][T10730] RBP: 000000000073bf00 R08: 0000000020000218 R09: 00000000fbad8001 [ 871.040791][T10730] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f82d85b36d4 [ 871.048748][T10730] R13: 00000000004c6679 R14: 00000000004db7d0 R15: 0000000000000003 20:13:25 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) r2 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000002c0)="f9d24f72e44b822af7b738c5e396bf420b6f28981eaca0599d3a43efbc3532fc365a89e4741873d2e1242950b31d40f1c840d4263f16ff590ff60a3c26e2e1bcc628310dbfb5b1711cd7fb92d2d9e7d9e68099f6516aa07a64140a06fd771757b396834327982f6b8a29a5928e38bb84c96fbae914323574a0ee78dd34caa59823124db257867b7fd33ea623be8ca0b22a062c998b0cba40c2583fdebffff0417897636c199f6dfa2b7eb664c6cecc8d079253861996f075c5a556ec953ee1e00b87983818", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000080)=""/38, 0x26) 20:13:25 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 20:13:25 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f00000000c0)=0x1, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000000e, 0x0) recvmsg(r1, &(0x7f0000000080)={&(0x7f00000004c0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)=""/66, 0x42}, {&(0x7f0000000300)=""/139, 0x8b}], 0x2, &(0x7f00000003c0)=""/222, 0xde}, 0x0) [ 871.093456][T10740] hfs: can't find a HFS filesystem on dev loop3 [ 871.122130][T10749] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 871.243571][T10762] FAULT_INJECTION: forcing a failure. [ 871.243571][T10762] name failslab, interval 1, probability 0, space 0, times 0 [ 871.290046][T10765] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 871.314163][T10762] CPU: 1 PID: 10762 Comm: syz-executor4 Not tainted 5.0.0-rc1-next-20190114 #11 [ 871.323224][T10762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.333391][T10762] Call Trace: 20:13:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 871.336686][T10762] dump_stack+0x1db/0x2d0 [ 871.341009][T10762] ? dump_stack_print_info.cold+0x20/0x20 [ 871.346715][T10762] ? new_inode_pseudo+0x71/0x1b0 [ 871.351644][T10762] ? new_inode+0x1f/0x40 [ 871.353504][T10770] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 871.355886][T10762] ? shmem_get_inode+0xe1/0x8d0 [ 871.355903][T10762] ? __shmem_file_setup.part.0+0x7e/0x2b0 [ 871.355918][T10762] ? shmem_file_setup+0x66/0x90 [ 871.355933][T10762] ? do_syscall_64+0x1a3/0x800 [ 871.355955][T10762] should_fail.cold+0xa/0x14 [ 871.389481][T10762] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 871.395277][T10762] ? ___might_sleep+0x1e7/0x310 [ 871.400123][T10762] ? arch_local_save_flags+0x50/0x50 [ 871.405404][T10762] ? lockdep_init_map+0x10c/0x5b0 [ 871.410417][T10762] __should_failslab+0x121/0x190 [ 871.415351][T10762] should_failslab+0x9/0x14 [ 871.419835][T10762] kmem_cache_alloc+0x2be/0x710 [ 871.424666][T10762] ? kasan_check_read+0x11/0x20 [ 871.429503][T10762] __d_alloc+0xae/0xbe0 [ 871.433656][T10762] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 871.439357][T10762] ? _raw_spin_unlock+0x2d/0x50 [ 871.444209][T10762] ? inode_sb_list_add+0x223/0x310 [ 871.449315][T10762] ? current_time+0x104/0x1b0 [ 871.453978][T10762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.460205][T10762] ? lockdep_init_map+0x10c/0x5b0 [ 871.465235][T10762] d_alloc_pseudo+0x1e/0x30 [ 871.469739][T10762] alloc_file_pseudo+0x14f/0x3b0 [ 871.474659][T10762] ? alloc_file+0x4d0/0x4d0 [ 871.479141][T10762] ? __check_object_size+0xa3/0x790 [ 871.484343][T10762] __shmem_file_setup.part.0+0x108/0x2b0 [ 871.489973][T10762] shmem_file_setup+0x66/0x90 [ 871.494751][T10762] __x64_sys_memfd_create+0x2a2/0x4b0 [ 871.500122][T10762] ? memfd_fcntl+0x1870/0x1870 [ 871.504868][T10762] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 871.510327][T10762] do_syscall_64+0x1a3/0x800 [ 871.514916][T10762] ? syscall_return_slowpath+0x5f0/0x5f0 [ 871.520532][T10762] ? prepare_exit_to_usermode+0x232/0x3b0 [ 871.526259][T10762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.531809][T10762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.537682][T10762] RIP: 0033:0x457ec9 [ 871.541583][T10762] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.561179][T10762] RSP: 002b:00007f82d85b2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 871.569589][T10762] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457ec9 [ 871.577562][T10762] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bce80 20:13:25 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:25 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{}]}) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x8, 0xff, 0x8, 0x5caa, 0x1b, 0x9, 0x5, 0x6, 0x5, 0x1}) 20:13:25 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 871.585529][T10762] RBP: 000000000073bf00 R08: 0000000020000218 R09: 00000000fbad8001 [ 871.593492][T10762] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f82d85b36d4 [ 871.601445][T10762] R13: 00000000004c6679 R14: 00000000004db7d0 R15: 0000000000000003 [ 871.734555][T10778] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 871.744516][T10780] FAULT_INJECTION: forcing a failure. [ 871.744516][T10780] name failslab, interval 1, probability 0, space 0, times 0 [ 871.761781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 871.767626][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:13:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 871.782707][T10780] CPU: 0 PID: 10780 Comm: syz-executor4 Not tainted 5.0.0-rc1-next-20190114 #11 [ 871.791751][T10780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.801806][T10780] Call Trace: [ 871.805116][T10780] dump_stack+0x1db/0x2d0 [ 871.809468][T10780] ? dump_stack_print_info.cold+0x20/0x20 [ 871.815191][T10780] ? percpu_ref_put_many+0x129/0x270 [ 871.820498][T10780] should_fail.cold+0xa/0x14 [ 871.825112][T10780] ? fault_create_debugfs_attr+0x1e0/0x1e0 20:13:25 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 871.830930][T10780] ? ___might_sleep+0x1e7/0x310 [ 871.835791][T10780] ? arch_local_save_flags+0x50/0x50 [ 871.841097][T10780] __should_failslab+0x121/0x190 [ 871.846041][T10780] should_failslab+0x9/0x14 [ 871.850561][T10780] kmem_cache_alloc+0x2be/0x710 [ 871.855418][T10780] ? d_instantiate+0x7b/0xa0 [ 871.860015][T10780] ? find_held_lock+0x35/0x120 [ 871.864786][T10780] __alloc_file+0x93/0x480 [ 871.869211][T10780] ? ____fput+0x20/0x20 [ 871.873372][T10780] ? kasan_check_read+0x11/0x20 [ 871.878401][T10780] ? do_raw_spin_unlock+0xa0/0x330 [ 871.883538][T10780] ? do_raw_spin_trylock+0x270/0x270 [ 871.883567][T10780] alloc_empty_file+0x72/0x170 [ 871.883586][T10780] alloc_file+0x5e/0x4d0 [ 871.897856][T10780] alloc_file_pseudo+0x24a/0x3b0 [ 871.897876][T10780] ? alloc_file+0x4d0/0x4d0 [ 871.897893][T10780] ? __check_object_size+0xa3/0x790 [ 871.907321][T10780] __shmem_file_setup.part.0+0x108/0x2b0 [ 871.907347][T10780] shmem_file_setup+0x66/0x90 [ 871.922820][T10780] __x64_sys_memfd_create+0x2a2/0x4b0 [ 871.922837][T10780] ? memfd_fcntl+0x1870/0x1870 [ 871.922855][T10780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 871.922876][T10780] do_syscall_64+0x1a3/0x800 [ 871.922897][T10780] ? syscall_return_slowpath+0x5f0/0x5f0 [ 871.944623][T10786] hfs: can't find a HFS filesystem on dev loop3 [ 871.948628][T10780] ? prepare_exit_to_usermode+0x232/0x3b0 [ 871.948652][T10780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.948677][T10780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.948693][T10780] RIP: 0033:0x457ec9 20:13:26 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) migrate_pages(r1, 0x5, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x10001) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 871.960630][T10780] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.960639][T10780] RSP: 002b:00007f82d85b2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 871.960654][T10780] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457ec9 [ 871.960661][T10780] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bce80 [ 871.960675][T10780] RBP: 000000000073bf00 R08: 0000000020000218 R09: 00000000fbad8001 [ 871.972066][T10780] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f82d85b36d4 20:13:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 871.972075][T10780] R13: 00000000004c6679 R14: 00000000004db7d0 R15: 0000000000000003 [ 871.972302][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 872.032469][T10792] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 872.036625][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 872.064492][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 872.070304][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 872.076183][ C0] protocol 88fb is buggy, dev hsr_slave_0 20:13:26 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 872.081984][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 872.136239][T10789] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 872.157604][T10786] hfs: can't find a HFS filesystem on dev loop3 [ 872.182760][T10807] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000002000010000000000000000000600000008000300000000000400000008000100ac1414aabc8ddf71808a09391fe1d29a23311436fb823b274b7943197054d2fd1b57e0ee241a7637bf61cbe2fbb4ecc88cebe311d955970d4077e2ae3b2f93f9ccd4726a991cf55fbeb245ad9cd7537f"], 0x28}}, 0x0) 20:13:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='gid_map\x00') preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) creat(&(0x7f0000000500)='./file0\x00', 0x6) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000400)={0x20, 0xfff, 0xfffffffffffffffa}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000040)={0xfffffffffffffbff, 0x5, 0x0, 0x1, &(0x7f00000002c0)=[{}, {}, {}, {}, {}]}) r3 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$BLKPG(r2, 0x1269, &(0x7f00000004c0)={0x9, 0x8, 0x54, &(0x7f0000000440)="0bffaec949e1639ecafb29ddadba07b4386422fe66a55086a43b71184a3c17a5c502d90474148f646891e2cf89054ca2ad297a2bf38a974f19bd678c56c8e70a629914be1eb279a568d980d81e8aaa9812f3b2c2"}) signalfd4(r2, &(0x7f00000000c0)={0xd62}, 0x8, 0x800) [ 872.208062][T10808] FAULT_INJECTION: forcing a failure. [ 872.208062][T10808] name failslab, interval 1, probability 0, space 0, times 0 [ 872.255242][T10808] CPU: 1 PID: 10808 Comm: syz-executor4 Not tainted 5.0.0-rc1-next-20190114 #11 [ 872.264303][T10808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.274378][T10808] Call Trace: [ 872.277725][T10808] dump_stack+0x1db/0x2d0 [ 872.282061][T10808] ? dump_stack_print_info.cold+0x20/0x20 [ 872.287778][T10808] ? __shmem_file_setup.part.0+0x108/0x2b0 [ 872.293575][T10808] ? shmem_file_setup+0x66/0x90 [ 872.298416][T10808] ? __x64_sys_memfd_create+0x2a2/0x4b0 [ 872.303953][T10808] ? do_syscall_64+0x1a3/0x800 [ 872.308713][T10808] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.314782][T10808] should_fail.cold+0xa/0x14 [ 872.319369][T10808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 872.325183][T10808] ? ___might_sleep+0x1e7/0x310 [ 872.330019][T10808] ? arch_local_save_flags+0x50/0x50 [ 872.335324][T10808] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 872.341561][T10808] __should_failslab+0x121/0x190 [ 872.346495][T10808] should_failslab+0x9/0x14 [ 872.350996][T10808] kmem_cache_alloc+0x2be/0x710 [ 872.355839][T10808] ? __alloc_file+0x93/0x480 [ 872.360419][T10808] ? rcu_read_lock_sched_held+0x110/0x130 [ 872.366123][T10808] ? kmem_cache_alloc+0x341/0x710 [ 872.371133][T10808] security_file_alloc+0x39/0x170 [ 872.376169][T10808] __alloc_file+0x128/0x480 [ 872.380674][T10808] ? ____fput+0x20/0x20 [ 872.384839][T10808] ? kasan_check_read+0x11/0x20 [ 872.389683][T10808] ? do_raw_spin_unlock+0xa0/0x330 [ 872.394796][T10808] ? do_raw_spin_trylock+0x270/0x270 [ 872.400087][T10808] alloc_empty_file+0x72/0x170 [ 872.404845][T10808] alloc_file+0x5e/0x4d0 [ 872.409097][T10808] alloc_file_pseudo+0x24a/0x3b0 [ 872.414038][T10808] ? alloc_file+0x4d0/0x4d0 [ 872.418541][T10808] ? __check_object_size+0xa3/0x790 [ 872.423764][T10808] __shmem_file_setup.part.0+0x108/0x2b0 [ 872.429394][T10808] shmem_file_setup+0x66/0x90 [ 872.434071][T10808] __x64_sys_memfd_create+0x2a2/0x4b0 [ 872.439435][T10808] ? memfd_fcntl+0x1870/0x1870 [ 872.444315][T10808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 872.449773][T10808] do_syscall_64+0x1a3/0x800 [ 872.454361][T10808] ? syscall_return_slowpath+0x5f0/0x5f0 [ 872.459989][T10808] ? prepare_exit_to_usermode+0x232/0x3b0 [ 872.465814][T10808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.471359][T10808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.477232][T10808] RIP: 0033:0x457ec9 [ 872.481108][T10808] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:13:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:26 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 872.500963][T10808] RSP: 002b:00007f82d85b2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 872.509373][T10808] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457ec9 [ 872.517326][T10808] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bce80 [ 872.525279][T10808] RBP: 000000000073bf00 R08: 0000000020000218 R09: 00000000fbad8001 [ 872.533241][T10808] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f82d85b36d4 [ 872.541203][T10808] R13: 00000000004c6679 R14: 00000000004db7d0 R15: 0000000000000003 [ 872.615857][T10816] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 872.632545][T10817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 872.681125][T10825] FAULT_INJECTION: forcing a failure. [ 872.681125][T10825] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 872.704505][T10822] hfs: can't find a HFS filesystem on dev loop3 [ 872.753304][T10825] CPU: 0 PID: 10825 Comm: syz-executor4 Not tainted 5.0.0-rc1-next-20190114 #11 [ 872.762359][T10825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.772422][T10825] Call Trace: [ 872.775762][T10825] dump_stack+0x1db/0x2d0 [ 872.780111][T10825] ? dump_stack_print_info.cold+0x20/0x20 [ 872.785844][T10825] ? print_usage_bug+0xd0/0xd0 [ 872.790631][T10825] should_fail.cold+0xa/0x14 [ 872.795242][T10825] ? fault_create_debugfs_attr+0x1e0/0x1e0 20:13:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x80000, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 872.801050][T10825] ? arch_local_save_flags+0x50/0x50 [ 872.806343][T10825] ? lock_release+0xc40/0xc40 [ 872.811026][T10825] ? __lock_is_held+0xb6/0x140 [ 872.815840][T10825] should_fail_alloc_page+0x50/0x60 [ 872.821020][T10825] __alloc_pages_nodemask+0x323/0xdc0 [ 872.826376][T10825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.832645][T10825] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 872.838346][T10825] ? kasan_check_read+0x11/0x20 [ 872.843177][T10825] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 872.849159][T10825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.855510][T10825] ? xas_load+0x67/0x150 [ 872.859753][T10825] ? mpol_shared_policy_lookup+0xf7/0x150 [ 872.865463][T10825] ? shmem_pseudo_vma_init+0x18d/0x2a0 [ 872.870905][T10825] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 872.877142][T10825] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 872.883378][T10825] alloc_pages_vma+0xdd/0x540 [ 872.888051][T10825] shmem_alloc_page+0xc0/0x1b0 [ 872.892792][T10825] ? shmem_swapin+0x230/0x230 [ 872.897527][T10825] ? cap_capable+0x205/0x270 [ 872.902111][T10825] shmem_alloc_and_acct_page+0x218/0xd90 [ 872.907741][T10825] ? shmem_getattr+0x2c0/0x2c0 [ 872.912494][T10825] ? find_held_lock+0x35/0x120 [ 872.917242][T10825] ? __lock_acquire+0x572/0x4a10 [ 872.922163][T10825] ? __lock_acquire+0x572/0x4a10 [ 872.927084][T10825] ? print_usage_bug+0xd0/0xd0 [ 872.932477][T10825] shmem_getpage_gfp+0x68d/0x4b70 [ 872.937502][T10825] ? shmem_add_to_page_cache+0x1a00/0x1a00 [ 872.943308][T10825] ? __lock_acquire+0x572/0x4a10 [ 872.948236][T10825] ? mark_held_locks+0x100/0x100 [ 872.953154][T10825] ? print_usage_bug+0xd0/0xd0 [ 872.957899][T10825] ? is_bpf_text_address+0xac/0x170 [ 872.963093][T10825] ? mark_held_locks+0x100/0x100 [ 872.968011][T10825] ? print_usage_bug+0xd0/0xd0 [ 872.972759][T10825] ? add_lock_to_list.isra.0+0x450/0x450 [ 872.978374][T10825] ? kasan_check_read+0x11/0x20 [ 872.983205][T10825] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 872.989164][T10825] ? print_usage_bug+0xd0/0xd0 [ 872.993916][T10825] ? __lock_acquire+0x572/0x4a10 [ 872.998848][T10825] ? simple_xattr_get+0x109/0x180 [ 873.003864][T10825] ? add_lock_to_list.isra.0+0x450/0x450 [ 873.009499][T10825] ? simple_xattr_get+0x109/0x180 [ 873.014504][T10825] ? print_usage_bug+0xd0/0xd0 [ 873.019248][T10825] ? lock_acquire+0x1db/0x570 [ 873.023905][T10825] ? current_time+0x6e/0x1b0 [ 873.028479][T10825] ? find_held_lock+0x35/0x120 [ 873.033223][T10825] ? mark_held_locks+0xb1/0x100 [ 873.038119][T10825] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 873.044002][T10825] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 873.049885][T10825] ? lockdep_hardirqs_on+0x415/0x5d0 [ 873.055174][T10825] ? trace_hardirqs_on+0xbd/0x310 [ 873.060182][T10825] ? current_time+0x6e/0x1b0 [ 873.064757][T10825] ? trace_hardirqs_off_caller+0x300/0x300 [ 873.070549][T10825] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 873.076251][T10825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.082516][T10825] ? iov_iter_fault_in_readable+0x22c/0x450 [ 873.088394][T10825] shmem_write_begin+0x105/0x1e0 [ 873.093324][T10825] generic_perform_write+0x2a0/0x6b0 [ 873.098599][T10825] ? add_page_wait_queue+0x480/0x480 [ 873.103862][T10825] ? current_time+0x1b0/0x1b0 [ 873.108532][T10825] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 873.114231][T10825] ? generic_write_check_limits+0x291/0x380 [ 873.120109][T10825] __generic_file_write_iter+0x25e/0x630 [ 873.125725][T10825] ? rcu_read_unlock_special+0x380/0x380 [ 873.131356][T10825] generic_file_write_iter+0x34e/0x6a0 [ 873.136800][T10825] ? __generic_file_write_iter+0x630/0x630 [ 873.142586][T10825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.148806][T10825] ? iov_iter_init+0xea/0x220 [ 873.153488][T10825] __vfs_write+0x764/0xb40 [ 873.157905][T10825] ? kernel_read+0x120/0x120 [ 873.162487][T10825] ? rcu_read_lock_sched_held+0x110/0x130 [ 873.168186][T10825] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 873.173626][T10825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 873.180289][T10825] ? __sb_start_write+0x1ac/0x360 [ 873.185308][T10825] vfs_write+0x20c/0x580 [ 873.189547][T10825] ksys_pwrite64+0x183/0x1c0 [ 873.194121][T10825] ? __ia32_sys_pread64+0xf0/0xf0 [ 873.199445][T10825] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 873.205674][T10825] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.211722][T10825] ? trace_hardirqs_off_caller+0x300/0x300 [ 873.217515][T10825] __x64_sys_pwrite64+0x97/0xf0 [ 873.222346][T10825] do_syscall_64+0x1a3/0x800 [ 873.226929][T10825] ? syscall_return_slowpath+0x5f0/0x5f0 [ 873.232544][T10825] ? prepare_exit_to_usermode+0x232/0x3b0 [ 873.238244][T10825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.243788][T10825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.249662][T10825] RIP: 0033:0x411ed7 [ 873.253536][T10825] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 873.273122][T10825] RSP: 002b:00007f82d85b2a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 873.281511][T10825] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000411ed7 [ 873.289465][T10825] RDX: 000000000000003d RSI: 0000000020010000 RDI: 0000000000000004 [ 873.297422][T10825] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 20:13:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) sendto$isdn(r1, &(0x7f0000000000)={0x9, 0x2492, "7c66566fa2059615559d723b8d1ec04a33026a4c6de7a1f2248a40b3b88bc575918b2b3e1ed3f34d686569f6024522db54a94ed83fce6aa35bcfcfc7d098668d99d04ad469247a734a56f1c933c5c5b0757e4efa3ecd5693818a7c4b76b97054ee2f13547cbc55"}, 0x6f, 0x20000000, 0x0, 0x0) 20:13:27 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 873.305379][T10825] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 873.313338][T10825] R13: 0000000000000001 R14: 00000000004db7d0 R15: 0000000000000003 [ 873.422458][T10822] hfs: can't find a HFS filesystem on dev loop3 [ 873.429238][T10844] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 873.464685][T10840] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 873.476387][T10825] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 20:13:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xc0', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:27 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x1c, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="50e80840fb4b731910da", @ANYRES64=r2, @ANYBLOB="05630440030000000663044003000000"], 0x79, 0x0, &(0x7f0000000080)="53f855c4afdedea9695f002e8861b0b7b8a93acaa9c0a211322706f86c8019ea879a01a81583faec4b53a146d3a758d8b2334d7f1c4761a67863bc4267bd68948d852eb74f905eccaf85d4a8c31da53185e31663b5135cdf87918ef609bd12f09dd5fa954d0d94c02959a12ae39078a46707eef09ce6fe559d"}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:27 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 873.609279][T10855] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 873.769843][T10868] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 873.827555][T10871] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 873.839008][T10872] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 873.862568][T10872] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device 20:13:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 873.876181][T10872] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 873.889263][T10872] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:13:28 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x301000) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x7fffffff, 0x764, [], &(0x7f0000000040)=0xfffffffffffffffd}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000002c0)={"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"}) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x80000, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, 0x0) 20:13:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 873.976531][T10888] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 874.001028][T10888] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x0f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:28 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e23, 0x24, @remote, 0x3}, @in6={0xa, 0x4e21, 0xde, @mcast1, 0x8}], 0x48) 20:13:28 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='\neiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 874.163842][T10899] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 874.222108][T10901] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:28 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:28 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='%eiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 874.428913][T10927] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, 0x0) 20:13:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 874.568556][T10935] hfs: can't find a HFS filesystem on dev loop3 [ 874.629301][T10942] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 874.634084][T10948] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 874.665820][T10935] hfs: can't find a HFS filesystem on dev loop3 20:13:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x80000, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:28 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000000)=0xfd77) 20:13:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 874.783062][T10959] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:28 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000000)={0x8, 0x4, 0x40b, 0x81, 0x2, 0x2}) 20:13:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}], 0x0, 0x0) 20:13:28 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='\x8eeiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 874.894637][T10968] hfs: can't find a HFS filesystem on dev loop3 [ 874.970718][T10972] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x3, 0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 875.018742][T10968] hfs: can't find a HFS filesystem on dev loop3 [ 875.044068][T10978] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:29 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:29 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='\x90eiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 875.192540][T10995] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 875.351483][T11006] hfs: can't find a HFS filesystem on dev loop3 20:13:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x80000, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:29 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f", 0x1f, 0x10000}], 0x0, 0x0) 20:13:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:29 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_proto_private(r0, 0x89e3, &(0x7f0000000000)="86034ee95ff6bcf993578743f4afebc62db83e51e070d9e564d99c6891cf226f4f6331183459ed4e8cac1f5fd8295206fb764744b25c00bf") r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 875.480809][T11020] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000380)={0x0, 0x2, 0x0, 0x10001, [], [], [], 0x3, 0x9, 0x8, 0x0, "a51a676199384b2ab5fe6bde0b3d140b"}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000001c0)={0x1, &(0x7f00000002c0)=[{}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x900, 0x0) 20:13:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 875.543020][T11006] hfs: can't find a HFS filesystem on dev loop3 [ 875.564088][T11017] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:29 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='r\niserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:29 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000100)={0x0, 0x3, @value=0x3824}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000540)={0x1495331bd2a1cd7, &(0x7f0000000440)=[{}]}) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@remote={[], 0x2}, 0x3, 'ip_vti0\x00'}) 20:13:29 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 875.690497][T11039] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:29 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f", 0x1f, 0x10000}], 0x0, 0x0) [ 875.913458][T11058] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 875.918721][T11053] hfs: can't find a HFS filesystem on dev loop3 20:13:30 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1a8, 0x30, 0x510, 0x70bd25, 0x25dfdbfe, {0x1b}, [@typed={0x14, 0x7, @ipv6=@local}, @generic="d6329f589d9d396512eb8e0e60f6fcfcc01624765967cf1392992ff81d5d8eeeb1cc36acab1bc6684817ff571bdc9811aebfb355e8fadfb67d7829074fbcf221d24e1013571d1ac8c6f2fc544b0b2a9d6d13615c193d198fc29292ca668108da42b7befa0070eb", @nested={0x4, 0x6a, [@generic]}, @typed={0xc, 0x7d, @str='.ð0\x00'}, @generic="47d57066d68e9a734fb2b3ba9ba629806d6da5fb842f32b4ff7f9e99029b467af93a349f805aec980c06699e224fcfaf4b36a88b8e6445c5045041e2f7778a852df241556e2ae15cfa7c7bacc0da06476304525fedee", @generic="9fb58e80bace12e39557635a78cd6be4b609e5cc9d8f1a8aad28a0454d50e022bb931a53da3c0d2219662c82c969af53072b9b667bb172b9b2300281a51ff72b936a33c5812fd93486203e4873f8e769e5b5a2ce0133605ec4ca1fa1496231871b7b71ad6ebb66950ec0d10fa4f9650fabe57e4cfffc25cae7b3e39939ab4138fef87ecb8d0dc2c3bc90017e57534a24685b6b14d09bd78820a8e82d6762c3989cb1be2f4e6b0d23b4fb676729b56d11aef1"]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 876.060361][T11053] hfs: can't find a HFS filesystem on dev loop3 [ 876.073884][T11062] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 876.092865][T11073] QAT: Invalid ioctl [ 876.120500][T11075] QAT: Invalid ioctl 20:13:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:30 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) fcntl$notify(r0, 0x402, 0x8000000000000020) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) fcntl$setsig(r1, 0xa, 0x2c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000080}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x110, r2, 0x814, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2bb}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8000, @mcast2, 0x7f}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000040}, 0x4004000) 20:13:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:30 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='r%iserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 876.206132][T11078] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 876.320780][T11090] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 876.347294][T11086] hfs: can't find a HFS filesystem on dev loop3 20:13:30 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) poll(&(0x7f0000000040)=[{r0, 0x2}, {r0, 0x129}, {r0, 0x1000}, {r0, 0x20}, {r0, 0x21}, {r0, 0x40}], 0x6, 0x5) r1 = dup(r0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x9) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:30 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f", 0x1f, 0x10000}], 0x0, 0x0) 20:13:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 876.567527][T11111] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:30 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='r\x8eiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:30 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 876.613071][T11113] hfs: can't find a HFS filesystem on dev loop3 [ 876.749939][T11117] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 876.775677][T11113] hfs: can't find a HFS filesystem on dev loop3 20:13:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:30 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8887, 0x6, 0x0, 0x5, 0x5, 0x3, 0x3e, 0x4, 0x29f, 0x38, 0x16b, 0x2d, 0x7, 0x20, 0x2, 0x7, 0x2, 0x7}, [{0x1, 0x40, 0x1ff, 0x81, 0x3ff, 0x3dd4, 0x9, 0x8}], "bab14091f3b4c69c6ce51b8e9fa5b774867b7f41d4a00a12446539e9009df1beebc88ae7e572aedd4bb871aac2b7423f6b5d7bd81bf24a8be89a2d0cbc8c5f9da5455c9de251d46b14547a47834c9f4d263e02d5a2a533ccaf29cea0cc8eb3ac32e5d022217651e95bdddd76e6caa6ab27a5cd95e23146763618e464b4dd870bd19be647154fdbafa6856f1632ccb664c3b703701903bd785869963e3cb62ce61efab19c5849e0926bd348d9c8680e852c01896790dc8476cc29d165ad8404be3ec56ef4fd583d8d2392ec252f9265eabb82cfaf", [[], []]}, 0x32c) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 876.883813][T11136] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:30 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='r\x90iserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 877.040346][T11154] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:31 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010", 0x2e, 0x10000}], 0x0, 0x0) 20:13:31 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) bind$ax25(r1, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setns(r1, 0x0) [ 877.140191][T11156] hfs: can't find a HFS filesystem on dev loop3 20:13:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:31 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) fgetxattr(r0, &(0x7f0000000000)=@random={'system.', '\x00'}, &(0x7f0000000040)=""/239, 0xef) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 877.296314][T11156] hfs: can't find a HFS filesystem on dev loop3 [ 877.302901][T11164] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 877.319977][T11177] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:31 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:31 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000000)={@remote, @rand_addr, @loopback}, &(0x7f0000000040)=0xc) r2 = dup(r0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000080)={0x0, {0x5, 0x8e8}}) r3 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='re\nserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:31 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010", 0x2e, 0x10000}], 0x0, 0x0) 20:13:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 877.557802][T11191] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 877.567400][T11191] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:31 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000000c0)={0x1fc, &(0x7f0000000380)=[{}]}) [ 877.702910][T11199] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 877.771509][T11209] hfs: can't find a HFS filesystem on dev loop3 [ 877.778268][T11208] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:31 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0x2, 0x51767559, 0xf000000000000000, 0x7, 0x3, @discrete={0x2, 0x1f}}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x24a00, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000100)={0x4, 0x8000, 0x80000001, 0x5, 0x1}) connect$tipc(r2, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x3, 0x1}}, 0x10) r3 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{}]}) 20:13:32 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010", 0x2e, 0x10000}], 0x0, 0x0) 20:13:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='re%serfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 877.976558][T11209] hfs: can't find a HFS filesystem on dev loop3 [ 877.995406][T11229] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:32 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) pread64(r1, &(0x7f0000000000)=""/63, 0x3f, 0x24) [ 878.217237][T11236] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:32 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:32 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{}]}) 20:13:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='re\x8eserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 878.311604][T11256] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 878.321525][T11256] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 878.390580][T11254] hfs: can't find a HFS filesystem on dev loop3 20:13:32 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265", 0x36, 0x10000}], 0x0, 0x0) 20:13:32 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "8190fa62ec75d5ccdd997084d55503d648755178"}, 0x15, 0x3) r1 = dup(r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0xfffffffffffffffc, 0x400, 0x1f, 0x9, 0x10000}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x4}, &(0x7f00000001c0)=0x8) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000440)=[{}]}) [ 878.481230][T11274] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 878.501965][T11254] hfs: can't find a HFS filesystem on dev loop3 [ 878.544480][T11278] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:32 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:32 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x31f) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 878.782590][T11294] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:32 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265", 0x36, 0x10000}], 0x0, 0x0) 20:13:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:32 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x5, {0x100000000, 0x1, 0x0, 0xd53, 0x0, 0xcde8}, 0x40, 0x8}, 0xe) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xc85a) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='re\x90serfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 878.921934][T11300] hfs: can't find a HFS filesystem on dev loop3 [ 878.926074][T11309] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:33 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) recvfrom$inet6(r1, &(0x7f00000002c0)=""/176, 0xb0, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1bacf914c1baffd, &(0x7f0000000200)=[{}]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000080)={r2, r3, 0xdc}) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 20:13:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 879.078403][T11315] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:33 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 879.135391][T11332] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:33 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265", 0x36, 0x10000}], 0x0, 0x0) 20:13:33 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei\nerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 879.296083][T11342] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 879.409706][T11352] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 879.454671][T11357] hfs: can't find a HFS filesystem on dev loop3 [ 879.465012][T11345] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 879.628348][T11371] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:33 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 879.784380][T11381] hfs: can't find a HFS filesystem on dev loop3 [ 879.869293][T11381] hfs: can't find a HFS filesystem on dev loop3 20:13:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000180)=0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80084004}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0xc8, r2, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6c00000000000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000000000}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x6}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4091}, 0x815) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:34 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei#erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572", 0x3a, 0x10000}], 0x0, 0x0) 20:13:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:34 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 880.036695][T11404] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 880.059192][T11397] hfs: can't find a HFS filesystem on dev loop3 20:13:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 880.095189][T11403] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000900)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x6, &(0x7f0000000640)=[{&(0x7f00000002c0)="5ca2ec48ea77d8326f6c66eb7e6b5cbb864b3a1e8c17f24e2ca37564601db16247de57f9f996fe70ec16146aa6e9a82dadfe7b490cc65c182c90f5e8b20535dad0683d1115fe5fea0f6565f9bfd06cbd11125b8c2b1263c01a3e3c41c7e0f0c10f18e1dab1205eca7c8362efcd1d6ff725f04d6ff86cc7c78f6ba954d97f0d82359d053886d591ec6fc68cd398f53ba20a447dd30d5a0662a3bc382c5ffa", 0x9e, 0xfffffffffffffffb}, {&(0x7f0000000180)="7ce77ad8fbc56b47b44d9a6cf83e28ec468ba8bfd5a4c9f389f7d7fd8592308410014572196542a936479763562389d3bd2842bdde6aeb0a505f5bdd4da3c2f9ee4caefdfa9b63a0da44f1f40053860e6ad6de00e7", 0x55, 0x6}, {&(0x7f0000000380)="c9305dda9877d92f98591b0a66ae9d9b9f171c5ba1c065e4ad57adff6874908fe7951f9692457ec7025cf2385113b24a8f0bc4c0ee85ec2491519c1a29db837db6e3567c3a90acb9cdaab1c86a953a1c7c3e60897edef5f562405c196a432164c0d90ef66ab133a956e4a0b1921e45058361187357ee8dd15d763962ace34ba4afbce2114622df36e40f870fdc15bd30131628e38c963c5ae38938f8eb9ae73fb3d7257a58c18f4f07", 0xa9, 0x7}, {&(0x7f0000000440)="b06d93827bbe3ec646e39334491a82c4d1827920d935b7a1204a1061a7f88fad2090ac993c93fdaa8008f42c6e3746a5e003c7fbfbff", 0x36, 0x6}, {&(0x7f0000000480)="f0ac9ee0af8b73a48802e3e3a7f2c6a62920dad82d7731bbb00040e4ef5dab1ccae1d90b9144eac4884e1833065596e7808e9e0a3e537744cbbe7f8b04956ec03c05558bc4699d58d616873326b4963eeacc355822ef2a299a2bb32685c68883fa219ad53d33dadc7738a521dec6b566c637276467b638bbee4a5ce1e0acb9d4f18f5b824cf101449655a80eb7015114d9fc9dff7df816e44305a23c0360e28f59e2c6eebb833f", 0xa7, 0x20}, {&(0x7f0000000540)="ad7efa41281488cd9bfca254a359a5b6fcac43cbdfea883a73ffcc90ce0af44bdd696110618df24df742a0b51400022c6f0ad034caee40e869a061f5f9c91ee4dc9595e5a6663d85ab59897d18fd30ce797bc379ee5dcd5d9ebb12d828fac1b65eb521617a05075b1e60fda84eefa714419519190119bdbc646fd5e5ade2e7a2f4c7666b3c1654ec09fb687d75b08cdd7ee3e5c19312119f87889ce9770ee5cd1b1953f84ebe57ea07d3102396c68edb2fdecd88de315901079b13e3bc87e885e4a3ebca3217cb51b6a7d1fe3de82c640462d73e80c358f820d2f7b38fe0152d658076f1a2e38346c35e", 0xea, 0x1ff}], 0x1082, &(0x7f0000000840)={[{@utf8='utf8=1'}, {@shortname_winnt='shortname=winnt'}], [{@fowner_gt={'fowner>', r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ip6gre0\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x3a}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/'}}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000040)={0x0, 0x0, 0x9, &(0x7f0000000000)=0x7}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'ve\x00\x00\x00\x00\x00\x00\x00\x00X\tie\x00', 0x7}) r3 = getpgid(0x0) sendto$netrom(r1, &(0x7f0000000740)="9b9e68b68eededc23cdcb2c9123695668ef5fc80c699e5a7e13c8239c19605679c9221f2f374059020f50f89df32a2", 0x2f, 0x20000851, &(0x7f0000000780)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_open_procfs(r3, &(0x7f0000000700)='oom_score_adj\x00') [ 880.167762][T11397] hfs: can't find a HFS filesystem on dev loop3 20:13:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572", 0x3a, 0x10000}], 0x0, 0x0) 20:13:34 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei%erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:34 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 880.291926][T11433] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 880.393634][T11440] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:34 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x18, 0x0, &(0x7f0000000040)=[@release={0x40046306, 0x3}, @request_death={0x400c630e, 0x3, 0x4}], 0x56, 0x0, &(0x7f0000000080)="04a9159bbd1b8639f353b29c4ed1bf96578ecf655be06c5cc7e577f9840e8627a2298eb97e9147d1fda77b97a6c81be74978083a9abce23eaea9cb673a318bd3095b93d5fb89ea14f36575c7878e5d545bff41733194"}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 880.550830][T11452] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 880.569498][T11436] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 880.591113][T11455] hfs: can't find a HFS filesystem on dev loop3 20:13:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)=0x8000) sysinfo(&(0x7f0000000000)=""/86) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x200, 0x8}) 20:13:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572", 0x3a, 0x10000}], 0x0, 0x0) 20:13:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 880.834388][T11455] hfs: can't find a HFS filesystem on dev loop3 [ 880.861215][T11481] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:34 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei*erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) connect(r0, &(0x7f0000000000)=@caif, 0x80) 20:13:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:35 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 881.042785][T11482] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 881.052132][T11498] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:35 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1bacf914c1baa3b, &(0x7f0000000200)=[{}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) bind$bt_hci(r1, &(0x7f00000001c0)={0x1f, r2, 0x3}, 0xc) 20:13:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:35 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei+erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 881.222071][T11509] hfs: can't find a HFS filesystem on dev loop3 [ 881.246017][T11513] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:35 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265497345723246", 0x3c, 0x10000}], 0x0, 0x0) 20:13:35 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x800, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000002c0)=""/248) r2 = dup(r0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000180)=0x53) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x78, r3, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fff}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffff0a}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5ebc}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9000000000000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x154}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) setsockopt(r2, 0x7, 0x5, &(0x7f0000000000)="c1018f18de61e747aece26dad5951b8d7b068c181dadd6f08352fc1a1f2e480b9d31459f45e5165ee4db611046e469b011e4e48f8a695ad09d00c82441a8518a338f2525bd86f3510dc136d1fa18467792914895721e7296184f281e057e86e8a6576d27516e823c1afce4da9a8ec7e82d6055c4aaf12a10718852b766e8cccf88e17e07b4b5b2b6da06b141570af9233c6f083d3a61c440c1e64cf398ca79bdf3a8a3d47255c1ec9036b311c3ffef0baec10446766689371c5c92162ee4258586b2006e68d1fa866accfcf2b69addaab347564d44d74787fcc9fd1099b9", 0xde) [ 881.372501][T11509] hfs: can't find a HFS filesystem on dev loop3 20:13:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:35 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fff, 0x490000) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x3d, 0x2}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:35 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 881.491566][T11539] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 881.527081][T11534] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:35 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei-erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:35 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 881.631553][T11551] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:35 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265497345723246", 0x3c, 0x10000}], 0x0, 0x0) 20:13:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 881.746307][T11566] Unknown ioctl -1073172856 [ 881.755585][T11561] hfs: can't find a HFS filesystem on dev loop3 [ 881.801793][T11570] Unknown ioctl -1073172856 20:13:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:35 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:35 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei.erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 881.903008][T11575] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 881.928935][T11572] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 881.940204][T11561] hfs: can't find a HFS filesystem on dev loop3 20:13:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:36 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x104, r2, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7e}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x15, 0x1}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3f}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x65}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xee4}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x52}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xae2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xa72a}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x104}, 0x1, 0x0, 0x0, 0x20000040}, 0x10) r3 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{}]}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000380)={'veth0_to_team\x00', {0x2, 0x4e22, @multicast2}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) 20:13:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei0erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:36 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec03020081005265497345723246", 0x3c, 0x10000}], 0x0, 0x0) [ 882.252996][T11610] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 882.315917][T11613] hfs: can't find a HFS filesystem on dev loop3 20:13:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiKerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) write(r1, &(0x7f0000000000), 0x340) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x328, &(0x7f0000000040)=[{}]}) [ 882.428858][T11613] hfs: can't find a HFS filesystem on dev loop3 [ 882.453259][T11620] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 882.486091][T11630] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:36 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:36 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d}], 0x0, 0x0) 20:13:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="3000a9006f020003009503000000020000000000000020000000000600000000000000890100000e0500000000000000"], 0x30) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$int_out(r1, 0x5462, &(0x7f0000000040)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80001, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000)=0x3ff, 0x4) 20:13:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 882.732249][T11640] hfs: can't find a HFS filesystem on dev loop3 [ 882.753586][T11651] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiXerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:36 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x99, &(0x7f00000002c0)=[{}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000000)={0x1, 0x8}) 20:13:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 882.918287][T11654] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 882.918334][T11665] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 882.962613][T11640] hfs: can't find a HFS filesystem on dev loop3 20:13:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:37 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x241, 0x1, 0x200, 0xa1, 0x20, 0x7}, 0x1bbb8000000}, 0xa) write$FUSE_INIT(r1, &(0x7f0000000080)={0x50, 0x0, 0x5, {0x7, 0x1c, 0xffffffffffff768b, 0x400, 0x73e, 0x3f, 0x50c, 0x3f80000000000000}}, 0x50) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) 20:13:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:37 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d}], 0x0, 0x0) 20:13:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 883.204617][T11686] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 883.278209][T11700] hfs: can't find a HFS filesystem on dev loop3 20:13:37 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiaerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, 0x0, 0x0) 20:13:37 executing program 1: r0 = socket$inet(0x2, 0x2, 0x52) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x94, &(0x7f0000000400)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x0, @rand_addr="8c73574b32f4493483d43ac7dec2c6e8", 0x2}, @in6={0xa, 0x4e24, 0x8000, @ipv4={[], [], @loopback}, 0x8}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in={0x2, 0x4e22, @rand_addr=0x800}, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x19}, 0x600000}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000004c0)=r1, 0x4) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) connect$vsock_dgram(r3, &(0x7f0000000540)={0x28, 0x0, 0x2711, @reserved}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="7700000038ed567f21b9a2c3b89ae13d2ebbf2347f9a205422e50000000000000000092c2cd59a9a52bffe5f014ae5b2524101c82af0d75dd69265afdc18506ead61d5592ad75a4c708c6ec8b1c9f4440eb006fdcda176b88805f2282c16f03c283910609c67374b6834a7d30575919cba150101c76619a48d485f"], &(0x7f0000000080)=0x7f) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x80000001, 0xfffffffffffffffc, 0x0, 0x6, 0x9e82}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000180)={r4, 0x68, &(0x7f0000000340)=[@in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x10001, @loopback, 0x480000000}, @in6={0xa, 0x4e24, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800}]}, &(0x7f00000003c0)=0x10) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000000c0)={0x0, 0x5}) r5 = fcntl$getown(r3, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000500)={0x2, r5}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000580)) 20:13:37 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10042, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) [ 883.463557][T11700] hfs: can't find a HFS filesystem on dev loop3 [ 883.472790][T11721] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 883.483034][T11692] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:37 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:37 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x158, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x35f8f4dc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffc01}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x357b213e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x4000040}, 0x41) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) recvfrom(r0, &(0x7f0000000040)=""/26, 0x1a, 0x100, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x4, 0x2, 0x4}}, 0x80) [ 883.684667][T11738] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d}], 0x0, 0x0) 20:13:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:37 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiberfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 883.834385][T11749] hfs: can't find a HFS filesystem on dev loop3 [ 883.857347][T11757] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 883.897079][T11759] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 20:13:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001bc0)}, 0x0) 20:13:38 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d}], 0x0, 0x0) [ 884.116587][T11773] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:38 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reicerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 884.216890][T11783] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 884.333386][T11790] hfs: can't find a HFS filesystem on dev loop3 [ 884.362289][T11801] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 884.480221][T11790] hfs: can't find a HFS filesystem on dev loop3 20:13:38 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x119000) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x4e22, 0xa19, @dev={0xfe, 0x80, [], 0x14}, 0x1f}, {0xa, 0x4e23, 0xa3, @remote, 0x400}, 0x3, [0x0, 0x1ff, 0x6, 0x3884, 0xffffffff, 0x4, 0xfffffffffffff904, 0x6]}, 0x5c) r2 = dup(r1) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000001c0)={0x20c2c000000000, 0x10000, 0x1}) setsockopt$inet6_int(r2, 0x29, 0x5a, &(0x7f0000000000)=0x8, 0x4) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000180)=@sha1={0x1, "45538fd64d491aba530d389b194c1adb796f8f87"}, 0x15, 0x3) 20:13:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{}]}) 20:13:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:38 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiderfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 884.662860][T11817] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:38 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1a8, 0x30, 0x510, 0x70bd25, 0x25dfdbfe, {0x1b}, [@typed={0x14, 0x7, @ipv6=@local}, @generic="d6329f589d9d396512eb8e0e60f6fcfcc01624765967cf1392992ff81d5d8eeeb1cc36acab1bc6684817ff571bdc9811aebfb355e8fadfb67d7829074fbcf221d24e1013571d1ac8c6f2fc544b0b2a9d6d13615c193d198fc29292ca668108da42b7befa0070eb", @nested={0x4, 0x6a, [@generic]}, @typed={0xc, 0x7d, @str='.ð0\x00'}, @generic="47d57066d68e9a734fb2b3ba9ba629806d6da5fb842f32b4ff7f9e99029b467af93a349f805aec980c06699e224fcfaf4b36a88b8e6445c5045041e2f7778a852df241556e2ae15cfa7c7bacc0da06476304525fedee", @generic="9fb58e80bace12e39557635a78cd6be4b609e5cc9d8f1a8aad28a0454d50e022bb931a53da3c0d2219662c82c969af53072b9b667bb172b9b2300281a51ff72b936a33c5812fd93486203e4873f8e769e5b5a2ce0133605ec4ca1fa1496231871b7b71ad6ebb66950ec0d10fa4f9650fabe57e4cfffc25cae7b3e39939ab4138fef87ecb8d0dc2c3bc90017e57534a24685b6b14d09bd78820a8e82d6762c3989cb1be2f4e6b0d23b4fb676729b56d11aef1"]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 884.712314][T11826] hfs: can't find a HFS filesystem on dev loop3 [ 884.803312][T11826] hfs: can't find a HFS filesystem on dev loop3 20:13:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {0x0}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 884.879556][T11844] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 884.905191][T11848] QAT: Invalid ioctl 20:13:39 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {0x0}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:39 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1a8, 0x30, 0x510, 0x70bd25, 0x25dfdbfe, {0x1b}, [@typed={0x14, 0x7, @ipv6=@local}, @generic="d6329f589d9d396512eb8e0e60f6fcfcc01624765967cf1392992ff81d5d8eeeb1cc36acab1bc6684817ff571bdc9811aebfb355e8fadfb67d7829074fbcf221d24e1013571d1ac8c6f2fc544b0b2a9d6d13615c193d198fc29292ca668108da42b7befa0070eb", @nested={0x4, 0x6a, [@generic]}, @typed={0xc, 0x7d, @str='.ð0\x00'}, @generic="47d57066d68e9a734fb2b3ba9ba629806d6da5fb842f32b4ff7f9e99029b467af93a349f805aec980c06699e224fcfaf4b36a88b8e6445c5045041e2f7778a852df241556e2ae15cfa7c7bacc0da06476304525fedee", @generic="9fb58e80bace12e39557635a78cd6be4b609e5cc9d8f1a8aad28a0454d50e022bb931a53da3c0d2219662c82c969af53072b9b667bb172b9b2300281a51ff72b936a33c5812fd93486203e4873f8e769e5b5a2ce0133605ec4ca1fa1496231871b7b71ad6ebb66950ec0d10fa4f9650fabe57e4cfffc25cae7b3e39939ab4138fef87ecb8d0dc2c3bc90017e57534a24685b6b14d09bd78820a8e82d6762c3989cb1be2f4e6b0d23b4fb676729b56d11aef1"]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:39 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiherfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 885.152322][T11861] hfs: can't find a HFS filesystem on dev loop3 [ 885.153743][T11869] QAT: Invalid ioctl 20:13:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {0x0}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 885.212817][T11873] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:39 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1a8, 0x30, 0x510, 0x70bd25, 0x25dfdbfe, {0x1b}, [@typed={0x14, 0x7, @ipv6=@local}, @generic="d6329f589d9d396512eb8e0e60f6fcfcc01624765967cf1392992ff81d5d8eeeb1cc36acab1bc6684817ff571bdc9811aebfb355e8fadfb67d7829074fbcf221d24e1013571d1ac8c6f2fc544b0b2a9d6d13615c193d198fc29292ca668108da42b7befa0070eb", @nested={0x4, 0x6a, [@generic]}, @typed={0xc, 0x7d, @str='.ð0\x00'}, @generic="47d57066d68e9a734fb2b3ba9ba629806d6da5fb842f32b4ff7f9e99029b467af93a349f805aec980c06699e224fcfaf4b36a88b8e6445c5045041e2f7778a852df241556e2ae15cfa7c7bacc0da06476304525fedee", @generic="9fb58e80bace12e39557635a78cd6be4b609e5cc9d8f1a8aad28a0454d50e022bb931a53da3c0d2219662c82c969af53072b9b667bb172b9b2300281a51ff72b936a33c5812fd93486203e4873f8e769e5b5a2ce0133605ec4ca1fa1496231871b7b71ad6ebb66950ec0d10fa4f9650fabe57e4cfffc25cae7b3e39939ab4138fef87ecb8d0dc2c3bc90017e57534a24685b6b14d09bd78820a8e82d6762c3989cb1be2f4e6b0d23b4fb676729b56d11aef1"]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000200)=[{}]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 885.387638][T11861] hfs: can't find a HFS filesystem on dev loop3 [ 885.420858][T11888] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:39 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1a8, 0x30, 0x510, 0x70bd25, 0x25dfdbfe, {0x1b}, [@typed={0x14, 0x7, @ipv6=@local}, @generic="d6329f589d9d396512eb8e0e60f6fcfcc01624765967cf1392992ff81d5d8eeeb1cc36acab1bc6684817ff571bdc9811aebfb355e8fadfb67d7829074fbcf221d24e1013571d1ac8c6f2fc544b0b2a9d6d13615c193d198fc29292ca668108da42b7befa0070eb", @nested={0x4, 0x6a, [@generic]}, @typed={0xc, 0x7d, @str='.ð0\x00'}, @generic="47d57066d68e9a734fb2b3ba9ba629806d6da5fb842f32b4ff7f9e99029b467af93a349f805aec980c06699e224fcfaf4b36a88b8e6445c5045041e2f7778a852df241556e2ae15cfa7c7bacc0da06476304525fedee", @generic="9fb58e80bace12e39557635a78cd6be4b609e5cc9d8f1a8aad28a0454d50e022bb931a53da3c0d2219662c82c969af53072b9b667bb172b9b2300281a51ff72b936a33c5812fd93486203e4873f8e769e5b5a2ce0133605ec4ca1fa1496231871b7b71ad6ebb66950ec0d10fa4f9650fabe57e4cfffc25cae7b3e39939ab4138fef87ecb8d0dc2c3bc90017e57534a24685b6b14d09bd78820a8e82d6762c3989cb1be2f4e6b0d23b4fb676729b56d11aef1"]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 885.450708][T11891] QAT: Invalid ioctl 20:13:39 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 885.604102][T11904] QAT: Invalid ioctl [ 885.619149][T11906] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:39 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1a8, 0x30, 0x510, 0x70bd25, 0x25dfdbfe, {0x1b}, [@typed={0x14, 0x7, @ipv6=@local}, @generic="d6329f589d9d396512eb8e0e60f6fcfcc01624765967cf1392992ff81d5d8eeeb1cc36acab1bc6684817ff571bdc9811aebfb355e8fadfb67d7829074fbcf221d24e1013571d1ac8c6f2fc544b0b2a9d6d13615c193d198fc29292ca668108da42b7befa0070eb", @nested={0x4, 0x6a, [@generic]}, @typed={0xc, 0x7d, @str='.ð0\x00'}, @generic="47d57066d68e9a734fb2b3ba9ba629806d6da5fb842f32b4ff7f9e99029b467af93a349f805aec980c06699e224fcfaf4b36a88b8e6445c5045041e2f7778a852df241556e2ae15cfa7c7bacc0da06476304525fedee", @generic="9fb58e80bace12e39557635a78cd6be4b609e5cc9d8f1a8aad28a0454d50e022bb931a53da3c0d2219662c82c969af53072b9b667bb172b9b2300281a51ff72b936a33c5812fd93486203e4873f8e769e5b5a2ce0133605ec4ca1fa1496231871b7b71ad6ebb66950ec0d10fa4f9650fabe57e4cfffc25cae7b3e39939ab4138fef87ecb8d0dc2c3bc90017e57534a24685b6b14d09bd78820a8e82d6762c3989cb1be2f4e6b0d23b4fb676729b56d11aef1"]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:39 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiierfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 885.712577][T11908] hfs: can't find a HFS filesystem on dev loop3 20:13:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 885.759782][T11918] QAT: Invalid ioctl 20:13:39 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 885.785381][T11919] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 885.884087][T11908] hfs: can't find a HFS filesystem on dev loop3 [ 885.964775][T11931] QAT: Invalid ioctl [ 886.069495][T11936] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:40 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:40 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reikerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 886.267287][T11951] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 886.274221][T11949] QAT: Invalid ioctl 20:13:40 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 886.362158][T11954] hfs: can't find a HFS filesystem on dev loop3 20:13:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reilerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {0x0}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 886.406717][T11968] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 886.500825][T11978] QAT: Invalid ioctl 20:13:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {0x0}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 886.627758][T11985] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:40 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:40 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reioerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {0x0}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 886.933450][T12000] QAT: Invalid ioctl 20:13:41 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 886.966974][T12005] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 887.002315][T12010] hfs: can't find a HFS filesystem on dev loop3 20:13:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:41 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:41 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiperfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 887.220636][T12029] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 887.255286][T12030] QAT: Invalid ioctl [ 887.407929][T12042] hfs: can't find a HFS filesystem on dev loop3 20:13:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:41 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:41 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) r2 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 887.512866][T12049] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 887.523374][T12053] QAT: Invalid ioctl 20:13:41 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:41 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiterfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {0x0}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 887.702694][T12070] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 887.712962][T12068] QAT: Invalid ioctl [ 887.731342][T12065] hfs: can't find a HFS filesystem on dev loop3 20:13:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:41 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {0x0}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 887.881794][T12085] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 887.934496][T12065] hfs: can't find a HFS filesystem on dev loop3 20:13:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x181000, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {0x0}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiuerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:42 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 888.193973][T12104] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 888.203640][T12104] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:42 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 888.326842][T12121] hfs: can't find a HFS filesystem on dev loop3 20:13:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 888.399923][T12128] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:42 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) 20:13:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reixerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 888.514525][T12121] hfs: can't find a HFS filesystem on dev loop3 20:13:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 888.648752][T12148] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {0x0}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:42 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 888.785874][T12159] hfs: can't find a HFS filesystem on dev loop3 20:13:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {0x0}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:42 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 888.880290][T12175] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 888.951469][T12159] hfs: can't find a HFS filesystem on dev loop3 20:13:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:43 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiyerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:43 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {0x0}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:43 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={{0x3f, 0x5, 0x0, 0x9, 0x7, 0xfffffffffffffff9}, 0x6}) [ 889.093051][T12195] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 889.269633][T12208] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:43 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:43 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reizerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 889.556103][T12240] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:43 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:43 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 889.715669][T12254] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 889.739754][T12253] FAULT_INJECTION: forcing a failure. [ 889.739754][T12253] name failslab, interval 1, probability 0, space 0, times 0 [ 889.764897][T12253] CPU: 1 PID: 12253 Comm: syz-executor1 Not tainted 5.0.0-rc1-next-20190114 #11 [ 889.773947][T12253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.784005][T12253] Call Trace: [ 889.787307][T12253] dump_stack+0x1db/0x2d0 [ 889.791649][T12253] ? dump_stack_print_info.cold+0x20/0x20 [ 889.797376][T12253] ? __lock_acquire+0x572/0x4a10 [ 889.802330][T12253] should_fail.cold+0xa/0x14 [ 889.806920][T12253] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 889.812727][T12253] ? mark_held_locks+0x100/0x100 [ 889.817658][T12253] ? ida_alloc_range+0x5b6/0xcf0 [ 889.822591][T12253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.828821][T12253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.835060][T12253] ? check_preemption_disabled+0x48/0x290 [ 889.840787][T12253] __should_failslab+0x121/0x190 [ 889.845725][T12253] should_failslab+0x9/0x14 [ 889.850213][T12253] kmem_cache_alloc_node+0x56/0x710 [ 889.855408][T12253] ? refcount_dec_if_one+0x180/0x180 [ 889.860692][T12253] __alloc_skb+0xf4/0x730 [ 889.865009][T12253] ? find_held_lock+0x35/0x120 [ 889.869791][T12253] ? skb_trim+0x190/0x190 [ 889.874113][T12253] ? refcount_dec_and_test_checked+0x1b/0x20 [ 889.880096][T12253] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 889.886326][T12253] ? apparmor_capable+0x390/0x730 [ 889.891337][T12253] ? apparmor_cred_transfer+0x670/0x670 [ 889.896876][T12253] ? do_raw_spin_unlock+0xa0/0x330 [ 889.901996][T12253] create_monitor_ctrl_open+0x20a/0x9e0 [ 889.907534][T12253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.913774][T12253] ? send_monitor_note+0x480/0x480 [ 889.918883][T12253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.925119][T12253] ? ns_capable_common+0x93/0x100 [ 889.930130][T12253] hci_sock_ioctl+0x68c/0x840 [ 889.934799][T12253] ? get_pid_task+0xd4/0x190 [ 889.939383][T12253] ? hci_sock_sendmsg+0x2730/0x2730 [ 889.944562][T12253] ? add_lock_to_list.isra.0+0x450/0x450 [ 889.950181][T12253] ? get_pid_task+0xd4/0x190 [ 889.954773][T12253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.961006][T12253] sock_do_ioctl+0xe2/0x400 [ 889.965491][T12253] ? find_held_lock+0x35/0x120 [ 889.970232][T12253] ? do_recvmmsg+0xc40/0xc40 [ 889.974814][T12253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.981060][T12253] ? lock_downgrade+0xbe0/0xbe0 [ 889.985924][T12253] ? kasan_check_read+0x11/0x20 [ 889.990771][T12253] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 889.996751][T12253] sock_ioctl+0x32f/0x6c0 [ 890.001071][T12253] ? routing_ioctl+0x8d0/0x8d0 [ 890.005820][T12253] ? __fget+0x49a/0x710 [ 890.009979][T12253] ? ksys_dup3+0x660/0x660 [ 890.014393][T12253] ? routing_ioctl+0x8d0/0x8d0 [ 890.019167][T12253] do_vfs_ioctl+0x107b/0x17d0 [ 890.023839][T12253] ? wait_for_completion+0x810/0x810 [ 890.029107][T12253] ? ioctl_preallocate+0x2f0/0x2f0 [ 890.034562][T12253] ? __fget_light+0x2db/0x420 [ 890.039242][T12253] ? fget_raw+0x20/0x20 [ 890.043405][T12253] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 890.049640][T12253] ? fput+0x128/0x1a0 [ 890.053620][T12253] ? do_syscall_64+0x8c/0x800 [ 890.058290][T12253] ? do_syscall_64+0x8c/0x800 [ 890.062962][T12253] ? lockdep_hardirqs_on+0x415/0x5d0 [ 890.068244][T12253] ? security_file_ioctl+0x93/0xc0 [ 890.073362][T12253] ksys_ioctl+0xab/0xd0 [ 890.077526][T12253] __x64_sys_ioctl+0x73/0xb0 [ 890.082128][T12253] do_syscall_64+0x1a3/0x800 [ 890.086722][T12253] ? syscall_return_slowpath+0x5f0/0x5f0 [ 890.092348][T12253] ? prepare_exit_to_usermode+0x232/0x3b0 [ 890.098078][T12253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.103630][T12253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.109512][T12253] RIP: 0033:0x457ec9 [ 890.113395][T12253] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 890.133009][T12253] RSP: 002b:00007ff7abf81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 890.141413][T12253] RAX: ffffffffffffffda RBX: 00007ff7abf81c90 RCX: 0000000000457ec9 [ 890.149365][T12253] RDX: 0000000000000000 RSI: 00000000400448c9 RDI: 0000000000000003 [ 890.157339][T12253] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:13:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 890.165306][T12253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7abf826d4 [ 890.173276][T12253] R13: 00000000004cb098 R14: 00000000004d5cb0 R15: 0000000000000005 20:13:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:44 executing program 1 (fault-call:2 fault-nth:1): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 890.332325][T12273] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 890.381244][T12279] FAULT_INJECTION: forcing a failure. [ 890.381244][T12279] name failslab, interval 1, probability 0, space 0, times 0 [ 890.396993][T12279] CPU: 1 PID: 12279 Comm: syz-executor1 Not tainted 5.0.0-rc1-next-20190114 #11 [ 890.406047][T12279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.416450][T12279] Call Trace: [ 890.419759][T12279] dump_stack+0x1db/0x2d0 [ 890.424105][T12279] ? dump_stack_print_info.cold+0x20/0x20 [ 890.429827][T12279] ? save_stack+0x45/0xd0 [ 890.434159][T12279] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 890.439956][T12279] ? kasan_slab_alloc+0xf/0x20 [ 890.444703][T12279] ? kmem_cache_alloc_node+0x144/0x710 [ 890.450148][T12279] ? __alloc_skb+0xf4/0x730 [ 890.454644][T12279] ? hci_sock_ioctl+0x68c/0x840 [ 890.459492][T12279] should_fail.cold+0xa/0x14 [ 890.464069][T12279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 890.469875][T12279] ? should_fail+0x250/0xd13 [ 890.474475][T12279] ? add_lock_to_list.isra.0+0x450/0x450 [ 890.480102][T12279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.486348][T12279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.492597][T12279] ? check_preemption_disabled+0x48/0x290 [ 890.498324][T12279] __should_failslab+0x121/0x190 [ 890.503436][T12279] should_failslab+0x9/0x14 [ 890.507941][T12279] kmem_cache_alloc_node_trace+0x5a/0x720 [ 890.513674][T12279] ? __alloc_skb+0xf4/0x730 [ 890.518195][T12279] __kmalloc_node_track_caller+0x3d/0x70 [ 890.523812][T12279] __kmalloc_reserve.isra.0+0x40/0xe0 [ 890.529185][T12279] __alloc_skb+0x12d/0x730 [ 890.533603][T12279] ? find_held_lock+0x35/0x120 [ 890.538363][T12279] ? skb_trim+0x190/0x190 [ 890.542689][T12279] ? refcount_dec_and_test_checked+0x1b/0x20 [ 890.548666][T12279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 890.554904][T12279] ? apparmor_capable+0x390/0x730 [ 890.559924][T12279] ? apparmor_cred_transfer+0x670/0x670 [ 890.565456][T12279] ? do_raw_spin_unlock+0xa0/0x330 [ 890.570561][T12279] create_monitor_ctrl_open+0x20a/0x9e0 [ 890.576094][T12279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.582347][T12279] ? send_monitor_note+0x480/0x480 [ 890.587454][T12279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.593691][T12279] ? ns_capable_common+0x93/0x100 [ 890.598709][T12279] hci_sock_ioctl+0x68c/0x840 [ 890.603377][T12279] ? get_pid_task+0xd4/0x190 [ 890.607959][T12279] ? hci_sock_sendmsg+0x2730/0x2730 [ 890.613150][T12279] ? add_lock_to_list.isra.0+0x450/0x450 [ 890.618772][T12279] ? get_pid_task+0xd4/0x190 [ 890.623357][T12279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.629609][T12279] sock_do_ioctl+0xe2/0x400 [ 890.634127][T12279] ? find_held_lock+0x35/0x120 [ 890.638884][T12279] ? do_recvmmsg+0xc40/0xc40 [ 890.643468][T12279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.649712][T12279] ? lock_downgrade+0xbe0/0xbe0 [ 890.654565][T12279] ? kasan_check_read+0x11/0x20 [ 890.659407][T12279] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 890.665381][T12279] sock_ioctl+0x32f/0x6c0 [ 890.669701][T12279] ? routing_ioctl+0x8d0/0x8d0 [ 890.674460][T12279] ? __fget+0x49a/0x710 [ 890.678630][T12279] ? ksys_dup3+0x660/0x660 [ 890.683053][T12279] ? routing_ioctl+0x8d0/0x8d0 [ 890.687824][T12279] do_vfs_ioctl+0x107b/0x17d0 [ 890.692687][T12279] ? wait_for_completion+0x810/0x810 [ 890.697982][T12279] ? ioctl_preallocate+0x2f0/0x2f0 [ 890.703099][T12279] ? __fget_light+0x2db/0x420 [ 890.707786][T12279] ? fget_raw+0x20/0x20 [ 890.711937][T12279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 890.718178][T12279] ? fput+0x128/0x1a0 [ 890.722175][T12279] ? do_syscall_64+0x8c/0x800 [ 890.726845][T12279] ? do_syscall_64+0x8c/0x800 [ 890.731521][T12279] ? lockdep_hardirqs_on+0x415/0x5d0 [ 890.736815][T12279] ? security_file_ioctl+0x93/0xc0 [ 890.741924][T12279] ksys_ioctl+0xab/0xd0 [ 890.746071][T12279] __x64_sys_ioctl+0x73/0xb0 [ 890.750648][T12279] do_syscall_64+0x1a3/0x800 [ 890.755232][T12279] ? syscall_return_slowpath+0x5f0/0x5f0 [ 890.760878][T12279] ? prepare_exit_to_usermode+0x232/0x3b0 [ 890.766582][T12279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.772227][T12279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.778114][T12279] RIP: 0033:0x457ec9 [ 890.782001][T12279] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 890.801619][T12279] RSP: 002b:00007ff7abf81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 890.810046][T12279] RAX: ffffffffffffffda RBX: 00007ff7abf81c90 RCX: 0000000000457ec9 [ 890.818013][T12279] RDX: 0000000000000000 RSI: 00000000400448c9 RDI: 0000000000000003 20:13:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 890.825966][T12279] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 890.834013][T12279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff7abf826d4 [ 890.841983][T12279] R13: 00000000004cb098 R14: 00000000004d5cb0 R15: 0000000000000005 20:13:44 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei\x8eerfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:44 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:44 executing program 1 (fault-call:2 fault-nth:2): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 890.916918][T12284] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5}, 0x0) [ 891.057096][T12293] hfs: can't find a HFS filesystem on dev loop3 20:13:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5}, 0x0) 20:13:45 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='rei\x90erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 891.165977][T12293] hfs: can't find a HFS filesystem on dev loop3 [ 891.180612][T12311] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:45 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5}, 0x0) 20:13:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x2, 0x0) 20:13:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x5421, 0x0) 20:13:45 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reis\nrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 891.478839][T12338] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x5450, 0x0) 20:13:45 executing program 2 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 891.669439][T12357] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:45 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x5451, 0x0) [ 891.727065][T12365] FAULT_INJECTION: forcing a failure. [ 891.727065][T12365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 891.767386][T12365] CPU: 1 PID: 12365 Comm: syz-executor2 Not tainted 5.0.0-rc1-next-20190114 #11 [ 891.776438][T12365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.786488][T12365] Call Trace: [ 891.789766][T12365] dump_stack+0x1db/0x2d0 [ 891.794096][T12365] ? dump_stack_print_info.cold+0x20/0x20 [ 891.799816][T12365] should_fail.cold+0xa/0x14 [ 891.804404][T12365] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 891.810215][T12365] ? arch_local_save_flags+0x50/0x50 [ 891.815492][T12365] ? lock_release+0xc40/0xc40 [ 891.820156][T12365] should_fail_alloc_page+0x50/0x60 [ 891.826050][T12365] __alloc_pages_nodemask+0x323/0xdc0 [ 891.831417][T12365] ? rb_erase_cached+0xb12/0x3590 [ 891.836428][T12365] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 891.842140][T12365] ? rb_next+0x140/0x140 [ 891.846381][T12365] ? print_usage_bug+0xd0/0xd0 [ 891.851127][T12365] ? mark_held_locks+0x100/0x100 [ 891.856065][T12365] ? rcu_read_unlock_special+0x380/0x380 [ 891.861692][T12365] ? print_usage_bug+0xd0/0xd0 [ 891.866445][T12365] ? print_usage_bug+0xd0/0xd0 [ 891.871192][T12365] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 891.877418][T12365] alloc_pages_current+0x107/0x210 [ 891.882528][T12365] pte_alloc_one+0x1b/0x1a0 [ 891.887053][T12365] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 891.892855][T12365] ? print_usage_bug+0xd0/0xd0 [ 891.897607][T12365] ? __update_load_avg_blocked_se+0x670/0x670 [ 891.903672][T12365] ? __thp_get_unmapped_area+0x190/0x190 [ 891.909398][T12365] ? mark_held_locks+0x100/0x100 [ 891.914336][T12365] ? pud_val+0x85/0x100 [ 891.918482][T12365] ? pmd_val+0x100/0x100 [ 891.922728][T12365] __handle_mm_fault+0x38cc/0x5610 [ 891.927834][T12365] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 891.933369][T12365] ? check_preemption_disabled+0x48/0x290 [ 891.939097][T12365] ? handle_mm_fault+0x3cc/0xc80 [ 891.944049][T12365] ? lock_downgrade+0xbe0/0xbe0 [ 891.948901][T12365] ? kasan_check_read+0x11/0x20 [ 891.953748][T12365] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 891.959723][T12365] ? rcu_read_unlock_special+0x380/0x380 [ 891.965355][T12365] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 891.971628][T12365] ? check_preemption_disabled+0x48/0x290 [ 891.977352][T12365] handle_mm_fault+0x4ec/0xc80 [ 891.982112][T12365] ? __handle_mm_fault+0x5610/0x5610 [ 891.987407][T12365] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 891.993126][T12365] __get_user_pages+0x8f7/0x1e10 [ 891.998064][T12365] ? follow_page_mask+0x1f40/0x1f40 [ 892.003253][T12365] ? lock_release+0xc40/0xc40 [ 892.007942][T12365] ? _raw_spin_unlock_irq+0x28/0x90 [ 892.013144][T12365] ? down_read+0x8d/0x120 [ 892.017465][T12365] ? get_user_pages_unlocked+0xfe/0x5d0 [ 892.023036][T12365] ? __down_interruptible+0x740/0x740 [ 892.028405][T12365] get_user_pages_unlocked+0x2fd/0x5d0 [ 892.033861][T12365] ? get_user_pages_longterm+0x630/0x630 [ 892.039484][T12365] ? __switch_to_asm+0x34/0x70 [ 892.044241][T12365] ? __switch_to_asm+0x34/0x70 [ 892.048994][T12365] ? __switch_to_asm+0x40/0x70 [ 892.053773][T12365] ? __switch_to_asm+0x34/0x70 [ 892.058526][T12365] ? __switch_to_asm+0x40/0x70 [ 892.063283][T12365] ? __switch_to_asm+0x34/0x70 [ 892.068036][T12365] ? __switch_to_asm+0x40/0x70 [ 892.072798][T12365] get_user_pages_fast+0x317/0x460 [ 892.077904][T12365] ? __get_user_pages_fast+0x3f0/0x3f0 [ 892.083372][T12365] ? pci_mmcfg_check_reserved+0x170/0x170 [ 892.089105][T12365] iov_iter_get_pages+0x2df/0x1290 [ 892.094218][T12365] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 892.099846][T12365] ? kernel_fpu_begin+0x220/0x220 [ 892.104859][T12365] ? memcpy+0x46/0x50 [ 892.108873][T12365] ? poly1305_simd_update+0x69/0x240 [ 892.114155][T12365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.120397][T12365] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 892.126127][T12365] ? iov_iter_advance+0x354/0x1490 [ 892.131287][T12365] af_alg_make_sg+0x9f/0x4b0 [ 892.135878][T12365] ? iov_iter_npages+0xf20/0xf20 [ 892.140797][T12365] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 892.145974][T12365] ? crypto_poly1305_init+0x1d/0xc0 [ 892.151160][T12365] hash_sendmsg+0x469/0xad0 [ 892.155657][T12365] ? hash_recvmsg+0xa60/0xa60 [ 892.160317][T12365] sock_sendmsg+0xdd/0x130 [ 892.164718][T12365] ___sys_sendmsg+0x7ec/0x910 [ 892.169376][T12365] ? copy_msghdr_from_user+0x570/0x570 [ 892.174813][T12365] ? ksys_dup3+0x660/0x660 [ 892.179242][T12365] ? fget_raw+0x20/0x20 [ 892.183397][T12365] ? __mutex_unlock_slowpath+0x195/0x870 [ 892.189029][T12365] ? wait_for_completion+0x810/0x810 [ 892.194311][T12365] ? __fdget+0x1b/0x20 [ 892.198372][T12365] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.204592][T12365] ? sockfd_lookup_light+0xc2/0x160 [ 892.209773][T12365] __sys_sendmsg+0x112/0x270 [ 892.214361][T12365] ? __ia32_sys_shutdown+0x80/0x80 [ 892.219479][T12365] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.225539][T12365] ? trace_hardirqs_off_caller+0x300/0x300 [ 892.231338][T12365] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 892.236798][T12365] __x64_sys_sendmsg+0x78/0xb0 [ 892.241552][T12365] do_syscall_64+0x1a3/0x800 [ 892.246132][T12365] ? syscall_return_slowpath+0x5f0/0x5f0 [ 892.251759][T12365] ? prepare_exit_to_usermode+0x232/0x3b0 [ 892.257474][T12365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.263026][T12365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.268908][T12365] RIP: 0033:0x457ec9 [ 892.272794][T12365] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 892.292397][T12365] RSP: 002b:00007f0cf53a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 892.300799][T12365] RAX: ffffffffffffffda RBX: 00007f0cf53a7c90 RCX: 0000000000457ec9 [ 892.308753][T12365] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 892.316702][T12365] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:13:46 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 892.324655][T12365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cf53a86d4 [ 892.332614][T12365] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:13:46 executing program 2 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:46 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x5452, 0x0) [ 892.412535][T12374] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:46 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reis%rfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 892.546271][T12388] FAULT_INJECTION: forcing a failure. [ 892.546271][T12388] name failslab, interval 1, probability 0, space 0, times 0 [ 892.632855][T12388] CPU: 1 PID: 12388 Comm: syz-executor2 Not tainted 5.0.0-rc1-next-20190114 #11 [ 892.641907][T12388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.652058][T12388] Call Trace: [ 892.655358][T12388] dump_stack+0x1db/0x2d0 [ 892.659700][T12388] ? dump_stack_print_info.cold+0x20/0x20 [ 892.665444][T12388] should_fail.cold+0xa/0x14 [ 892.670046][T12388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 892.670072][T12388] ? ___might_sleep+0x1e7/0x310 [ 892.670087][T12388] ? arch_local_save_flags+0x50/0x50 [ 892.670107][T12388] ? rb_next+0x140/0x140 [ 892.690246][T12388] __should_failslab+0x121/0x190 [ 892.695192][T12388] should_failslab+0x9/0x14 [ 892.699731][T12388] kmem_cache_alloc+0x2be/0x710 [ 892.704583][T12388] ? print_usage_bug+0xd0/0xd0 [ 892.709347][T12388] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 892.715598][T12388] ptlock_alloc+0x20/0x70 [ 892.719945][T12388] pte_alloc_one+0x6d/0x1a0 [ 892.724461][T12388] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 892.730274][T12388] ? print_usage_bug+0xd0/0xd0 [ 892.735045][T12388] ? __update_load_avg_blocked_se+0x670/0x670 [ 892.741231][T12388] ? __thp_get_unmapped_area+0x190/0x190 [ 892.746872][T12388] ? mark_held_locks+0x100/0x100 [ 892.751824][T12388] ? pud_val+0x85/0x100 [ 892.755993][T12388] ? pmd_val+0x100/0x100 [ 892.760248][T12388] __handle_mm_fault+0x38cc/0x5610 [ 892.765377][T12388] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 892.770929][T12388] ? check_preemption_disabled+0x48/0x290 [ 892.776670][T12388] ? handle_mm_fault+0x3cc/0xc80 [ 892.781627][T12388] ? lock_downgrade+0xbe0/0xbe0 [ 892.786479][T12388] ? kasan_check_read+0x11/0x20 [ 892.791341][T12388] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 892.797327][T12388] ? rcu_read_unlock_special+0x380/0x380 [ 892.802977][T12388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.809224][T12388] ? check_preemption_disabled+0x48/0x290 [ 892.814967][T12388] handle_mm_fault+0x4ec/0xc80 [ 892.819741][T12388] ? __handle_mm_fault+0x5610/0x5610 [ 892.825035][T12388] ? __sanitizer_cov_trace_cmp8+0x18/0x20 20:13:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 892.830762][T12388] __get_user_pages+0x8f7/0x1e10 [ 892.835721][T12388] ? follow_page_mask+0x1f40/0x1f40 [ 892.840925][T12388] ? lock_release+0xc40/0xc40 [ 892.845712][T12388] ? _raw_spin_unlock_irq+0x28/0x90 [ 892.850939][T12388] ? down_read+0x8d/0x120 [ 892.855283][T12388] ? get_user_pages_unlocked+0xfe/0x5d0 [ 892.860831][T12388] ? __down_interruptible+0x740/0x740 [ 892.860857][T12388] get_user_pages_unlocked+0x2fd/0x5d0 [ 892.860880][T12388] ? get_user_pages_longterm+0x630/0x630 [ 892.877306][T12388] ? __switch_to_asm+0x34/0x70 [ 892.877324][T12388] ? __switch_to_asm+0x34/0x70 [ 892.877347][T12388] ? __switch_to_asm+0x40/0x70 [ 892.877365][T12388] ? __switch_to_asm+0x34/0x70 [ 892.896367][T12388] ? __switch_to_asm+0x40/0x70 [ 892.901137][T12388] ? __switch_to_asm+0x34/0x70 [ 892.905908][T12388] ? __switch_to_asm+0x40/0x70 [ 892.910688][T12388] get_user_pages_fast+0x317/0x460 [ 892.915811][T12388] ? __get_user_pages_fast+0x3f0/0x3f0 [ 892.921271][T12388] ? pci_mmcfg_check_reserved+0x170/0x170 [ 892.927006][T12388] iov_iter_get_pages+0x2df/0x1290 [ 892.932139][T12388] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 892.937777][T12388] ? kernel_fpu_begin+0x220/0x220 [ 892.942815][T12388] ? memcpy+0x46/0x50 [ 892.946805][T12388] ? poly1305_simd_update+0x69/0x240 [ 892.952111][T12388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.958354][T12388] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 892.964080][T12388] ? iov_iter_advance+0x354/0x1490 [ 892.969201][T12388] af_alg_make_sg+0x9f/0x4b0 [ 892.973804][T12388] ? iov_iter_npages+0xf20/0xf20 [ 892.978753][T12388] ? af_alg_wmem_wakeup+0x7b0/0x7b0 20:13:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 892.983962][T12388] ? crypto_poly1305_init+0x1d/0xc0 [ 892.989184][T12388] hash_sendmsg+0x469/0xad0 [ 892.993713][T12388] ? hash_recvmsg+0xa60/0xa60 [ 892.998399][T12388] sock_sendmsg+0xdd/0x130 [ 893.002820][T12388] ___sys_sendmsg+0x7ec/0x910 [ 893.005975][T12411] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 893.007506][T12388] ? copy_msghdr_from_user+0x570/0x570 [ 893.007522][T12388] ? ksys_dup3+0x660/0x660 [ 893.007559][T12388] ? fget_raw+0x20/0x20 20:13:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 893.030616][T12388] ? __mutex_unlock_slowpath+0x195/0x870 [ 893.036265][T12388] ? wait_for_completion+0x810/0x810 [ 893.041558][T12388] ? __fdget+0x1b/0x20 [ 893.045631][T12388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.051881][T12388] ? sockfd_lookup_light+0xc2/0x160 [ 893.057089][T12388] __sys_sendmsg+0x112/0x270 [ 893.061711][T12388] ? __ia32_sys_shutdown+0x80/0x80 [ 893.066847][T12388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.072923][T12388] ? trace_hardirqs_off_caller+0x300/0x300 [ 893.078732][T12388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 893.084193][T12388] __x64_sys_sendmsg+0x78/0xb0 [ 893.088962][T12388] do_syscall_64+0x1a3/0x800 [ 893.093549][T12388] ? syscall_return_slowpath+0x5f0/0x5f0 [ 893.099175][T12388] ? prepare_exit_to_usermode+0x232/0x3b0 [ 893.104880][T12388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.110413][T12388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.116295][T12388] RIP: 0033:0x457ec9 [ 893.120171][T12388] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 893.139778][T12388] RSP: 002b:00007f0cf53a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 893.148181][T12388] RAX: ffffffffffffffda RBX: 00007f0cf53a7c90 RCX: 0000000000457ec9 [ 893.156133][T12388] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 893.164102][T12388] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 893.172063][T12388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cf53a86d4 20:13:47 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x5460, 0x0) [ 893.180034][T12388] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:13:47 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:47 executing program 2 (fault-call:4 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 893.224579][T12414] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:47 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8901, 0x0) [ 893.341122][T12427] FAULT_INJECTION: forcing a failure. [ 893.341122][T12427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:13:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:47 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reis\x8erfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 893.461312][T12438] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 893.490801][T12427] CPU: 1 PID: 12427 Comm: syz-executor2 Not tainted 5.0.0-rc1-next-20190114 #11 [ 893.499859][T12427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.509928][T12427] Call Trace: [ 893.513230][T12427] dump_stack+0x1db/0x2d0 [ 893.517571][T12427] ? dump_stack_print_info.cold+0x20/0x20 [ 893.523306][T12427] should_fail.cold+0xa/0x14 [ 893.527918][T12427] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 893.533738][T12427] ? arch_local_save_flags+0x50/0x50 [ 893.539026][T12427] ? lock_release+0xc40/0xc40 [ 893.543708][T12427] ? __x64_sys_sendmsg+0x78/0xb0 [ 893.548657][T12427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.554831][T12427] should_fail_alloc_page+0x50/0x60 20:13:47 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8902, 0x0) [ 893.560038][T12427] __alloc_pages_nodemask+0x323/0xdc0 [ 893.565414][T12427] ? __phys_addr+0xa4/0x120 [ 893.569945][T12427] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 893.575677][T12427] ? __lock_acquire+0x572/0x4a10 [ 893.580623][T12427] ? print_usage_bug+0xd0/0xd0 [ 893.585391][T12427] ? kasan_check_read+0x11/0x20 [ 893.590252][T12427] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 893.596504][T12427] alloc_pages_current+0x107/0x210 [ 893.601626][T12427] pte_alloc_one+0x1b/0x1a0 [ 893.606134][T12427] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 893.611951][T12427] ? print_usage_bug+0xd0/0xd0 [ 893.616716][T12427] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 893.622468][T12427] ? __thp_get_unmapped_area+0x190/0x190 [ 893.628106][T12427] ? mark_held_locks+0x100/0x100 [ 893.633050][T12427] ? add_lock_to_list.isra.0+0x450/0x450 [ 893.638687][T12427] ? pud_val+0x85/0x100 [ 893.642847][T12427] ? pmd_val+0x100/0x100 [ 893.647107][T12427] ? follow_page_mask+0x1c61/0x1f40 [ 893.652320][T12427] __handle_mm_fault+0x38cc/0x5610 [ 893.657449][T12427] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 893.663012][T12427] ? check_preemption_disabled+0x48/0x290 [ 893.668757][T12427] ? handle_mm_fault+0x3cc/0xc80 [ 893.673717][T12427] ? lock_downgrade+0xbe0/0xbe0 [ 893.678570][T12427] ? kasan_check_read+0x11/0x20 [ 893.683436][T12427] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 893.689426][T12427] ? rcu_read_unlock_special+0x380/0x380 [ 893.695060][T12427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.701306][T12427] ? check_preemption_disabled+0x48/0x290 [ 893.707036][T12427] handle_mm_fault+0x4ec/0xc80 [ 893.711796][T12427] ? __handle_mm_fault+0x5610/0x5610 [ 893.717076][T12427] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 893.722776][T12427] __get_user_pages+0x8f7/0x1e10 [ 893.727698][T12427] ? follow_page_mask+0x1f40/0x1f40 [ 893.732898][T12427] ? lock_release+0xc40/0xc40 [ 893.737574][T12427] ? down_read+0x8d/0x120 [ 893.741908][T12427] ? get_user_pages_unlocked+0xfe/0x5d0 [ 893.747439][T12427] ? __down_interruptible+0x740/0x740 [ 893.752813][T12427] get_user_pages_unlocked+0x2fd/0x5d0 [ 893.758268][T12427] ? get_user_pages_longterm+0x630/0x630 [ 893.763887][T12427] ? mark_held_locks+0x100/0x100 [ 893.768811][T12427] get_user_pages_fast+0x317/0x460 [ 893.773912][T12427] ? __get_user_pages_fast+0x3f0/0x3f0 [ 893.779355][T12427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.785585][T12427] ? aa_label_sk_perm+0x103/0xa10 [ 893.790599][T12427] iov_iter_get_pages+0x2df/0x1290 [ 893.795714][T12427] ? poly1305_simd_mult+0xb3/0xf0 [ 893.800739][T12427] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 893.806395][T12427] ? kernel_fpu_begin+0x220/0x220 [ 893.811431][T12427] ? memcpy+0x46/0x50 [ 893.815401][T12427] ? poly1305_simd_update+0x69/0x240 [ 893.820690][T12427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.826924][T12427] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 893.832635][T12427] ? iov_iter_advance+0x354/0x1490 [ 893.837758][T12427] af_alg_make_sg+0x9f/0x4b0 [ 893.842340][T12427] ? iov_iter_npages+0xf20/0xf20 [ 893.847260][T12427] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 893.852450][T12427] ? crypto_poly1305_init+0x1d/0xc0 [ 893.857643][T12427] hash_sendmsg+0x469/0xad0 [ 893.862146][T12427] ? hash_recvmsg+0xa60/0xa60 [ 893.866828][T12427] sock_sendmsg+0xdd/0x130 [ 893.871246][T12427] ___sys_sendmsg+0x7ec/0x910 [ 893.875919][T12427] ? copy_msghdr_from_user+0x570/0x570 [ 893.881371][T12427] ? ksys_dup3+0x660/0x660 [ 893.885817][T12427] ? fget_raw+0x20/0x20 [ 893.889973][T12427] ? __mutex_unlock_slowpath+0x195/0x870 [ 893.895983][T12427] ? wait_for_completion+0x810/0x810 [ 893.901258][T12427] ? __fdget+0x1b/0x20 [ 893.905327][T12427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 893.911561][T12427] ? sockfd_lookup_light+0xc2/0x160 [ 893.916753][T12427] __sys_sendmsg+0x112/0x270 [ 893.921325][T12427] ? __ia32_sys_shutdown+0x80/0x80 [ 893.926426][T12427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.932485][T12427] ? trace_hardirqs_off_caller+0x300/0x300 [ 893.938374][T12427] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 893.943816][T12427] __x64_sys_sendmsg+0x78/0xb0 [ 893.948574][T12427] do_syscall_64+0x1a3/0x800 [ 893.953174][T12427] ? syscall_return_slowpath+0x5f0/0x5f0 [ 893.958799][T12427] ? prepare_exit_to_usermode+0x232/0x3b0 [ 893.964503][T12427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.970036][T12427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 893.975910][T12427] RIP: 0033:0x457ec9 [ 893.979785][T12427] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 893.999474][T12427] RSP: 002b:00007f0cf53a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:13:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:48 executing program 2 (fault-call:4 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 894.007977][T12427] RAX: ffffffffffffffda RBX: 00007f0cf53a7c90 RCX: 0000000000457ec9 [ 894.015936][T12427] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 894.023890][T12427] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 894.031852][T12427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cf53a86d4 [ 894.039824][T12427] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:13:48 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8903, 0x0) 20:13:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 894.219540][T12466] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:48 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8904, 0x0) 20:13:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 894.285931][T12464] FAULT_INJECTION: forcing a failure. [ 894.285931][T12464] name failslab, interval 1, probability 0, space 0, times 0 [ 894.301443][T12464] CPU: 1 PID: 12464 Comm: syz-executor2 Not tainted 5.0.0-rc1-next-20190114 #11 [ 894.310479][T12464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.320530][T12464] Call Trace: [ 894.323844][T12464] dump_stack+0x1db/0x2d0 [ 894.328188][T12464] ? dump_stack_print_info.cold+0x20/0x20 [ 894.333924][T12464] should_fail.cold+0xa/0x14 [ 894.338512][T12464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 894.344329][T12464] ? ___might_sleep+0x1e7/0x310 [ 894.349187][T12464] ? arch_local_save_flags+0x50/0x50 [ 894.354477][T12464] ? rb_next+0x140/0x140 [ 894.358739][T12464] __should_failslab+0x121/0x190 [ 894.363688][T12464] should_failslab+0x9/0x14 [ 894.368980][T12464] kmem_cache_alloc+0x2be/0x710 [ 894.373841][T12464] ? add_lock_to_list.isra.0+0x450/0x450 [ 894.379465][T12464] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 894.385711][T12464] ptlock_alloc+0x20/0x70 [ 894.390039][T12464] pte_alloc_one+0x6d/0x1a0 [ 894.394543][T12464] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 894.394558][T12464] ? print_usage_bug+0xd0/0xd0 [ 894.394575][T12464] ? __update_load_avg_blocked_se+0x670/0x670 [ 894.394595][T12464] ? __thp_get_unmapped_area+0x190/0x190 [ 894.394609][T12464] ? mark_held_locks+0x100/0x100 [ 894.394630][T12464] ? pud_val+0x85/0x100 [ 894.394644][T12464] ? pmd_val+0x100/0x100 [ 894.394666][T12464] __handle_mm_fault+0x38cc/0x5610 [ 894.421795][T12464] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 894.421815][T12464] ? check_preemption_disabled+0x48/0x290 [ 894.421840][T12464] ? handle_mm_fault+0x3cc/0xc80 [ 894.421872][T12464] ? lock_downgrade+0xbe0/0xbe0 [ 894.421888][T12464] ? kasan_check_read+0x11/0x20 [ 894.421903][T12464] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 894.421921][T12464] ? rcu_read_unlock_special+0x380/0x380 [ 894.435383][T12464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 894.479003][T12464] ? check_preemption_disabled+0x48/0x290 [ 894.484761][T12464] handle_mm_fault+0x4ec/0xc80 [ 894.489539][T12464] ? __handle_mm_fault+0x5610/0x5610 [ 894.494923][T12464] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 894.500652][T12464] __get_user_pages+0x8f7/0x1e10 [ 894.505609][T12464] ? follow_page_mask+0x1f40/0x1f40 [ 894.510811][T12464] ? lock_release+0xc40/0xc40 [ 894.515497][T12464] ? _raw_spin_unlock_irq+0x28/0x90 [ 894.520700][T12464] ? down_read+0x8d/0x120 [ 894.525031][T12464] ? get_user_pages_unlocked+0xfe/0x5d0 [ 894.530584][T12464] ? __down_interruptible+0x740/0x740 [ 894.535969][T12464] get_user_pages_unlocked+0x2fd/0x5d0 [ 894.541444][T12464] ? get_user_pages_longterm+0x630/0x630 [ 894.547075][T12464] ? __switch_to_asm+0x34/0x70 [ 894.547093][T12464] ? __switch_to_asm+0x34/0x70 [ 894.556598][T12464] ? __switch_to_asm+0x40/0x70 [ 894.561371][T12464] ? __switch_to_asm+0x34/0x70 [ 894.566141][T12464] ? __switch_to_asm+0x40/0x70 [ 894.570922][T12464] ? __switch_to_asm+0x34/0x70 [ 894.575691][T12464] ? __switch_to_asm+0x40/0x70 [ 894.580466][T12464] get_user_pages_fast+0x317/0x460 [ 894.580488][T12464] ? __get_user_pages_fast+0x3f0/0x3f0 [ 894.580506][T12464] ? pci_mmcfg_check_reserved+0x170/0x170 [ 894.580533][T12464] iov_iter_get_pages+0x2df/0x1290 [ 894.580557][T12464] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 894.607530][T12464] ? kernel_fpu_begin+0x220/0x220 [ 894.612566][T12464] ? memcpy+0x46/0x50 [ 894.616553][T12464] ? poly1305_simd_update+0x69/0x240 [ 894.621855][T12464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.628096][T12464] ? __sanitizer_cov_trace_cmp8+0x18/0x20 20:13:48 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8940, 0x0) [ 894.633906][T12464] ? iov_iter_advance+0x354/0x1490 [ 894.639031][T12464] af_alg_make_sg+0x9f/0x4b0 [ 894.643631][T12464] ? iov_iter_npages+0xf20/0xf20 [ 894.648578][T12464] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 894.653853][T12464] ? shash_ahash_update+0x150/0x150 [ 894.659063][T12464] hash_sendmsg+0x469/0xad0 [ 894.663575][T12464] ? hash_recvmsg+0xa60/0xa60 [ 894.668259][T12464] sock_sendmsg+0xdd/0x130 [ 894.672681][T12464] ___sys_sendmsg+0x7ec/0x910 [ 894.677451][T12464] ? copy_msghdr_from_user+0x570/0x570 [ 894.682916][T12464] ? ksys_dup3+0x660/0x660 20:13:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 894.687367][T12464] ? fget_raw+0x20/0x20 [ 894.691528][T12464] ? __mutex_unlock_slowpath+0x195/0x870 [ 894.697171][T12464] ? wait_for_completion+0x810/0x810 [ 894.702484][T12464] ? __fdget+0x1b/0x20 [ 894.706559][T12464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 894.712813][T12464] ? sockfd_lookup_light+0xc2/0x160 [ 894.718020][T12464] __sys_sendmsg+0x112/0x270 [ 894.722614][T12464] ? __ia32_sys_shutdown+0x80/0x80 [ 894.727746][T12464] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.733826][T12464] ? trace_hardirqs_off_caller+0x300/0x300 [ 894.739633][T12464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 894.745089][T12464] __x64_sys_sendmsg+0x78/0xb0 [ 894.749838][T12464] do_syscall_64+0x1a3/0x800 [ 894.754434][T12464] ? syscall_return_slowpath+0x5f0/0x5f0 [ 894.760082][T12464] ? prepare_exit_to_usermode+0x232/0x3b0 [ 894.765789][T12464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.771328][T12464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.777205][T12464] RIP: 0033:0x457ec9 [ 894.781078][T12464] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 894.800664][T12464] RSP: 002b:00007f0cf53a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 894.809073][T12464] RAX: ffffffffffffffda RBX: 00007f0cf53a7c90 RCX: 0000000000457ec9 [ 894.817027][T12464] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 894.824997][T12464] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 894.832957][T12464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cf53a86d4 [ 894.840919][T12464] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:13:48 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reis\x90rfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:48 executing program 2 (fault-call:4 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8941, 0x0) [ 894.996057][T12498] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 895.015191][T12496] FAULT_INJECTION: forcing a failure. [ 895.015191][T12496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:13:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 895.050136][T12496] CPU: 1 PID: 12496 Comm: syz-executor2 Not tainted 5.0.0-rc1-next-20190114 #11 [ 895.059181][T12496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.069242][T12496] Call Trace: [ 895.072548][T12496] dump_stack+0x1db/0x2d0 [ 895.076884][T12496] ? dump_stack_print_info.cold+0x20/0x20 [ 895.082603][T12496] ? __lock_is_held+0xb6/0x140 [ 895.087470][T12496] ? kvm_sched_clock_read+0x9/0x20 [ 895.092590][T12496] should_fail.cold+0xa/0x14 [ 895.097178][T12496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 895.102984][T12496] ? arch_local_save_flags+0x50/0x50 [ 895.108261][T12496] ? lock_release+0xc40/0xc40 [ 895.112945][T12496] should_fail_alloc_page+0x50/0x60 [ 895.118150][T12496] __alloc_pages_nodemask+0x323/0xdc0 [ 895.123517][T12496] ? rb_erase_cached+0xb12/0x3590 [ 895.128531][T12496] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 895.134241][T12496] ? rb_next+0x140/0x140 [ 895.138487][T12496] ? _raw_spin_unlock_irq+0x28/0x90 [ 895.143671][T12496] ? print_usage_bug+0xd0/0xd0 [ 895.148426][T12496] ? trace_hardirqs_off_caller+0x300/0x300 [ 895.154227][T12496] ? do_raw_spin_trylock+0x270/0x270 [ 895.159679][T12496] ? print_usage_bug+0xd0/0xd0 [ 895.164424][T12496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.170648][T12496] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 895.176889][T12496] alloc_pages_current+0x107/0x210 [ 895.182185][T12496] pte_alloc_one+0x1b/0x1a0 [ 895.186680][T12496] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 895.192478][T12496] ? print_usage_bug+0xd0/0xd0 [ 895.197234][T12496] ? __update_load_avg_blocked_se+0x670/0x670 [ 895.203285][T12496] ? __thp_get_unmapped_area+0x190/0x190 [ 895.208924][T12496] ? mark_held_locks+0x100/0x100 [ 895.213865][T12496] ? pud_val+0x85/0x100 [ 895.218013][T12496] ? pmd_val+0x100/0x100 [ 895.222258][T12496] __handle_mm_fault+0x38cc/0x5610 [ 895.227365][T12496] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 895.232903][T12496] ? check_preemption_disabled+0x48/0x290 [ 895.238630][T12496] ? handle_mm_fault+0x3cc/0xc80 [ 895.243575][T12496] ? lock_downgrade+0xbe0/0xbe0 [ 895.248406][T12496] ? kasan_check_read+0x11/0x20 [ 895.253246][T12496] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 895.259220][T12496] ? rcu_read_unlock_special+0x380/0x380 [ 895.264832][T12496] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 895.271072][T12496] ? check_preemption_disabled+0x48/0x290 [ 895.276785][T12496] handle_mm_fault+0x4ec/0xc80 [ 895.281550][T12496] ? __handle_mm_fault+0x5610/0x5610 [ 895.286818][T12496] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 895.292532][T12496] __get_user_pages+0x8f7/0x1e10 [ 895.297466][T12496] ? follow_page_mask+0x1f40/0x1f40 [ 895.302652][T12496] ? lock_release+0xc40/0xc40 [ 895.307315][T12496] ? _raw_spin_unlock_irq+0x28/0x90 [ 895.312519][T12496] ? down_read+0x8d/0x120 [ 895.316868][T12496] ? get_user_pages_unlocked+0xfe/0x5d0 [ 895.322420][T12496] ? __down_interruptible+0x740/0x740 [ 895.327796][T12496] get_user_pages_unlocked+0x2fd/0x5d0 [ 895.333257][T12496] ? get_user_pages_longterm+0x630/0x630 [ 895.338884][T12496] ? __switch_to_asm+0x34/0x70 [ 895.343630][T12496] ? __switch_to_asm+0x34/0x70 [ 895.348388][T12496] ? __switch_to_asm+0x40/0x70 [ 895.353149][T12496] ? __switch_to_asm+0x34/0x70 [ 895.357916][T12496] ? __switch_to_asm+0x40/0x70 [ 895.362666][T12496] ? __switch_to_asm+0x34/0x70 [ 895.367415][T12496] ? __switch_to_asm+0x40/0x70 [ 895.372178][T12496] get_user_pages_fast+0x317/0x460 [ 895.377287][T12496] ? __get_user_pages_fast+0x3f0/0x3f0 [ 895.382747][T12496] ? pci_mmcfg_check_reserved+0x170/0x170 [ 895.388464][T12496] iov_iter_get_pages+0x2df/0x1290 [ 895.393579][T12496] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 895.399223][T12496] ? kernel_fpu_begin+0x220/0x220 [ 895.404236][T12496] ? memcpy+0x46/0x50 [ 895.408213][T12496] ? poly1305_simd_update+0x69/0x240 [ 895.413492][T12496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 895.419722][T12496] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 895.425440][T12496] ? iov_iter_advance+0x354/0x1490 [ 895.430548][T12496] af_alg_make_sg+0x9f/0x4b0 [ 895.435156][T12496] ? iov_iter_npages+0xf20/0xf20 [ 895.440092][T12496] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 895.445273][T12496] ? crypto_poly1305_init+0x1d/0xc0 [ 895.450461][T12496] hash_sendmsg+0x469/0xad0 [ 895.454965][T12496] ? hash_recvmsg+0xa60/0xa60 [ 895.459639][T12496] sock_sendmsg+0xdd/0x130 [ 895.464041][T12496] ___sys_sendmsg+0x7ec/0x910 [ 895.468703][T12496] ? copy_msghdr_from_user+0x570/0x570 [ 895.474150][T12496] ? ksys_dup3+0x660/0x660 [ 895.478589][T12496] ? fget_raw+0x20/0x20 [ 895.482731][T12496] ? __mutex_unlock_slowpath+0x195/0x870 [ 895.488381][T12496] ? wait_for_completion+0x810/0x810 [ 895.493674][T12496] ? __fdget+0x1b/0x20 [ 895.497735][T12496] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 895.503975][T12496] ? sockfd_lookup_light+0xc2/0x160 [ 895.509178][T12496] __sys_sendmsg+0x112/0x270 [ 895.513772][T12496] ? __ia32_sys_shutdown+0x80/0x80 [ 895.518891][T12496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.524950][T12496] ? trace_hardirqs_off_caller+0x300/0x300 [ 895.530739][T12496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 895.536199][T12496] __x64_sys_sendmsg+0x78/0xb0 [ 895.540956][T12496] do_syscall_64+0x1a3/0x800 [ 895.545542][T12496] ? syscall_return_slowpath+0x5f0/0x5f0 [ 895.551160][T12496] ? prepare_exit_to_usermode+0x232/0x3b0 [ 895.556866][T12496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.562414][T12496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 895.568300][T12496] RIP: 0033:0x457ec9 [ 895.572184][T12496] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 895.591785][T12496] RSP: 002b:00007f0cf53a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:13:49 executing program 2 (fault-call:4 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 895.600194][T12496] RAX: ffffffffffffffda RBX: 00007f0cf53a7c90 RCX: 0000000000457ec9 [ 895.608148][T12496] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 895.616109][T12496] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 895.624085][T12496] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cf53a86d4 [ 895.632147][T12496] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:13:49 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 895.775666][T12521] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x894c, 0x0) 20:13:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, 0x0, 0x0) 20:13:49 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reise\nfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8980, 0x0) 20:13:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 896.069519][T12548] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8981, 0x0) 20:13:50 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 896.125930][T12522] FAULT_INJECTION: forcing a failure. [ 896.125930][T12522] name failslab, interval 1, probability 0, space 0, times 0 [ 896.148273][T12522] CPU: 0 PID: 12522 Comm: syz-executor2 Not tainted 5.0.0-rc1-next-20190114 #11 [ 896.157319][T12522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.167382][T12522] Call Trace: [ 896.170660][T12522] dump_stack+0x1db/0x2d0 [ 896.174975][T12522] ? dump_stack_print_info.cold+0x20/0x20 [ 896.180682][T12522] should_fail.cold+0xa/0x14 [ 896.185264][T12522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 896.191056][T12522] ? ___might_sleep+0x1e7/0x310 [ 896.195900][T12522] ? arch_local_save_flags+0x50/0x50 [ 896.201193][T12522] __should_failslab+0x121/0x190 [ 896.206131][T12522] should_failslab+0x9/0x14 [ 896.210617][T12522] kmem_cache_alloc+0x2be/0x710 [ 896.215465][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.221701][T12522] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 896.227939][T12522] ptlock_alloc+0x20/0x70 [ 896.232263][T12522] pte_alloc_one+0x6d/0x1a0 [ 896.236769][T12522] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 896.242564][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.248802][T12522] ? perf_pmu_enable+0xdd/0x120 [ 896.253637][T12522] ? __thp_get_unmapped_area+0x190/0x190 [ 896.259251][T12522] ? mark_held_locks+0xb1/0x100 [ 896.264094][T12522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 896.269536][T12522] ? lockdep_hardirqs_on+0x415/0x5d0 [ 896.274811][T12522] ? pud_val+0x85/0x100 [ 896.278958][T12522] ? pmd_val+0x100/0x100 [ 896.283195][T12522] ? trace_hardirqs_on_caller+0xc0/0x310 [ 896.288819][T12522] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 896.294972][T12522] __handle_mm_fault+0x38cc/0x5610 [ 896.300091][T12522] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 896.305620][T12522] ? handle_mm_fault+0x3cc/0xc80 [ 896.310543][T12522] ? lock_downgrade+0xbe0/0xbe0 [ 896.315382][T12522] ? kasan_check_read+0x11/0x20 [ 896.320214][T12522] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 896.326192][T12522] ? rcu_read_unlock_special+0x380/0x380 [ 896.331829][T12522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.338053][T12522] ? check_preemption_disabled+0x48/0x290 [ 896.343756][T12522] handle_mm_fault+0x4ec/0xc80 [ 896.348503][T12522] ? __handle_mm_fault+0x5610/0x5610 [ 896.353771][T12522] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 896.359513][T12522] __get_user_pages+0x8f7/0x1e10 [ 896.364449][T12522] ? follow_page_mask+0x1f40/0x1f40 [ 896.369638][T12522] ? lock_release+0xc40/0xc40 [ 896.374328][T12522] ? down_read+0x8d/0x120 [ 896.378648][T12522] ? get_user_pages_unlocked+0xfe/0x5d0 [ 896.384188][T12522] ? __down_interruptible+0x740/0x740 [ 896.389567][T12522] get_user_pages_unlocked+0x2fd/0x5d0 [ 896.395012][T12522] ? get_user_pages_longterm+0x630/0x630 [ 896.400624][T12522] ? get_user_pages_fast+0xad/0x460 [ 896.405800][T12522] ? get_user_pages_fast+0xba/0x460 [ 896.410993][T12522] get_user_pages_fast+0x317/0x460 [ 896.416111][T12522] ? __get_user_pages_fast+0x3f0/0x3f0 [ 896.421567][T12522] iov_iter_get_pages+0x2df/0x1290 [ 896.426688][T12522] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 896.432308][T12522] ? kernel_fpu_begin+0x220/0x220 [ 896.437327][T12522] ? memcpy+0x46/0x50 [ 896.441289][T12522] ? poly1305_simd_update+0x69/0x240 [ 896.446563][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.452795][T12522] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 896.458499][T12522] ? iov_iter_advance+0x354/0x1490 [ 896.463596][T12522] af_alg_make_sg+0x9f/0x4b0 [ 896.468173][T12522] ? iov_iter_npages+0xf20/0xf20 [ 896.473095][T12522] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 896.478280][T12522] hash_sendmsg+0x469/0xad0 [ 896.482767][T12522] ? hash_recvmsg+0xa60/0xa60 [ 896.487428][T12522] sock_sendmsg+0xdd/0x130 [ 896.491827][T12522] ___sys_sendmsg+0x7ec/0x910 [ 896.496489][T12522] ? copy_msghdr_from_user+0x570/0x570 [ 896.501927][T12522] ? ksys_dup3+0x660/0x660 [ 896.506356][T12522] ? fget_raw+0x20/0x20 [ 896.510506][T12522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 896.515957][T12522] ? lockdep_hardirqs_on+0x415/0x5d0 [ 896.521225][T12522] ? retint_kernel+0x2d/0x2d [ 896.525796][T12522] ? trace_hardirqs_on_caller+0xc0/0x310 [ 896.531408][T12522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 896.536850][T12522] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 896.543002][T12522] ? __fdget+0x1b/0x20 [ 896.547055][T12522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 896.553291][T12522] ? sockfd_lookup_light+0xc2/0x160 [ 896.558483][T12522] __sys_sendmsg+0x112/0x270 [ 896.563066][T12522] ? __ia32_sys_shutdown+0x80/0x80 [ 896.568175][T12522] ? __sys_sendmsg+0x20/0x270 [ 896.572835][T12522] __x64_sys_sendmsg+0x78/0xb0 [ 896.577588][T12522] do_syscall_64+0x1a3/0x800 [ 896.582163][T12522] ? syscall_return_slowpath+0x5f0/0x5f0 [ 896.587949][T12522] ? prepare_exit_to_usermode+0x232/0x3b0 [ 896.593654][T12522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.599201][T12522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.605077][T12522] RIP: 0033:0x457ec9 [ 896.608957][T12522] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 896.628544][T12522] RSP: 002b:00007f0cf53a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 896.640676][T12522] RAX: ffffffffffffffda RBX: 00007f0cf53a7c90 RCX: 0000000000457ec9 [ 896.648634][T12522] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 896.656607][T12522] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 896.664561][T12522] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0cf53a86d4 [ 896.672516][T12522] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:13:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:50 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reise%fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8982, 0x0) 20:13:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 896.827858][T12566] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:50 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x8983, 0x0) 20:13:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:51 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 897.072820][T12596] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001bc0)}, 0x0) 20:13:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:51 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x89a0, 0x0) 20:13:51 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reise\x8efs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 897.241157][T12609] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:51 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x89a1, 0x0) 20:13:51 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reise\x90fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 897.521830][T12634] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x3, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:51 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:51 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448ca, 0x0) 20:13:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 897.747684][T12651] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 897.882560][T12670] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:51 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448cb, 0x0) 20:13:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {0x0}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiser\ns\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448cc, 0x0) 20:13:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {0x0}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:52 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x4, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 898.277413][T12692] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 898.287054][T12692] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 898.369716][T12694] hfs: can't find a HFS filesystem on dev loop3 20:13:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {0x0}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448dd, 0x0) [ 898.412047][T12711] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 898.496147][T12694] hfs: can't find a HFS filesystem on dev loop3 20:13:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448e4, 0x0) 20:13:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:52 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf9', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiser%s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x5, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 898.669897][T12728] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 898.779571][T12734] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:52 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xfc', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x40049409, 0x0) 20:13:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 899.037891][T12761] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:53 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiser.s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x4020940d, 0x0) 20:13:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {0x0}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 899.266250][T12785] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x6, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:53 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xfd', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x800448d2, 0x0) 20:13:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {0x0}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:53 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiser/s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 899.584392][T12813] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x800448d3, 0x0) 20:13:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x7, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:53 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x7f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {0x0}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 899.819731][T12834] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x800448d4, 0x0) 20:13:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:54 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiser\x8es\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 900.056623][T12853] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:54 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x800448f0, 0x0) 20:13:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:54 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x8c', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 900.337295][T12871] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x8, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:54 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiser\x90s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:54 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0xc0045878, 0x0) 20:13:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) [ 900.704252][T12898] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:54 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x97', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:54 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0xc0045878, 0x0) 20:13:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {0x0}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 900.920700][T12919] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {0x0}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0xc0189436, 0x0) 20:13:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x9, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:55 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf\n\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf4', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 901.144214][T12941] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0xc020660b, 0x0) 20:13:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {0x0}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 901.376370][T12970] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:55 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf#\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf5', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:55 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfff, 0x0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000040)=0x7f) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) [ 901.641866][T12984] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xa, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:55 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x60080, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) r1 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:55 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf%\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xf6', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 901.928464][T13014] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) sendfile(r1, r0, &(0x7f0000000000), 0x4) 20:13:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {0x0}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:56 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf*\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 902.220863][T13046] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) socket$isdn(0x22, 0x3, 0x0) 20:13:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ptrace$peek(0x2, r1, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x5, 0x7, 0x40, 0x4, 0x1000}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x9, 0xf29}, &(0x7f0000000100)=0x10) r3 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f0000000000)={0xc2, 0x7ff, 0x0, 0x1, 0x1, 0x8}) 20:13:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {0x0}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:56 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xfb', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xb, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 902.496300][T13068] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {0x0}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:56 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf+\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@mcast1, r2}, 0x14) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 902.674008][T13088] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xc, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 902.864895][T13107] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:56 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xfd', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:56 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x20400, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0xac, &(0x7f0000000040)="89ee4b5527828ae29ae966d58055988614bdc8f3509307e3c6a93da4c0a04b465164905cd345593a4e3e2aefe470405056ccd67feed66963ac4db8dd99950be7a784e43e047de98f89fa6fe35e8faf9298b41dcaf82b1d03ed8df2b50c20e4a00a7c78c238957010989615310eb81af9997121974ca1d93b14bfbb42ae5218ff2826f04f2eb81c8bf2ce85dab392792105f3255abdee4a47b75aa7b16317b3c4081e480fe4bad2a30f32b14a"}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) 20:13:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 903.099460][T13124] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:57 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x484c00) accept4$packet(0xffffffffffffff9c, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000700)=0x14, 0x80000) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000740)={r1, 0x380000, 0x4, 0x70df, 0x7, 0x4, 0x9}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, 0x0) 20:13:57 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf-\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x4, &(0x7f0000001bc0)}, 0x0) 20:13:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:57 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xd, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 903.465167][T13155] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:57 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf.\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000000)={0x7, 0x3}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:13:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xe, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 903.779103][T13180] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 903.825944][T13177] hfs: can't find a HFS filesystem on dev loop3 20:13:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8a, 0x400000) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x54) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@hyper}) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) 20:13:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 904.047104][T13177] hfs: can't find a HFS filesystem on dev loop3 20:13:58 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 904.108282][T13212] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:58 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5}, 0x0) 20:13:58 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x8000, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000040)={0x3ff, 0xd0df, 0x4, 0x0, 0x2, [{0x8, 0x6, 0x3f, 0x0, 0x0, 0x400}, {0x6, 0x3fc000, 0xff, 0x0, 0x0, 0x1804}]}) 20:13:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) uselib(&(0x7f0000000000)='./file0\x00') shmget(0x2, 0x1000, 0x526, &(0x7f0000fff000/0x1000)=nil) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) getpeername$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) 20:13:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5}, 0x0) 20:13:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 904.285619][T13226] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xf, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 904.358822][T13227] hfs: can't find a HFS filesystem on dev loop3 20:13:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5}, 0x0) 20:13:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x80080) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x1}) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) [ 904.428209][T13242] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 904.509338][T13227] hfs: can't find a HFS filesystem on dev loop3 20:13:58 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfK\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 904.604124][T13257] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:58 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:58 executing program 0 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:58 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x80, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x80000001) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000080)=0x3, 0x4) 20:13:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40080, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040), 0x10) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x4, 0x2) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r3, 0x11e, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000080) 20:13:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x30, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 904.756032][T13270] FAULT_INJECTION: forcing a failure. [ 904.756032][T13270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 904.776345][T13270] CPU: 0 PID: 13270 Comm: syz-executor0 Not tainted 5.0.0-rc1-next-20190114 #11 [ 904.785395][T13270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.795534][T13270] Call Trace: [ 904.798826][T13270] dump_stack+0x1db/0x2d0 [ 904.803145][T13270] ? dump_stack_print_info.cold+0x20/0x20 [ 904.808852][T13270] should_fail.cold+0xa/0x14 [ 904.813441][T13270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 904.819245][T13270] ? arch_local_save_flags+0x50/0x50 [ 904.824526][T13270] ? lock_release+0xc40/0xc40 [ 904.829203][T13270] should_fail_alloc_page+0x50/0x60 [ 904.834400][T13270] __alloc_pages_nodemask+0x323/0xdc0 [ 904.839767][T13270] ? rb_erase_cached+0xb12/0x3590 [ 904.844775][T13270] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 904.850486][T13270] ? rb_next+0x140/0x140 [ 904.854733][T13270] ? print_usage_bug+0xd0/0xd0 [ 904.859489][T13270] ? mark_held_locks+0x100/0x100 [ 904.864435][T13270] ? rcu_read_unlock_special+0x380/0x380 [ 904.870057][T13270] ? print_usage_bug+0xd0/0xd0 [ 904.874935][T13270] ? print_usage_bug+0xd0/0xd0 [ 904.879692][T13270] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 904.885920][T13270] alloc_pages_current+0x107/0x210 [ 904.891028][T13270] pte_alloc_one+0x1b/0x1a0 [ 904.895533][T13270] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 904.901331][T13270] ? print_usage_bug+0xd0/0xd0 [ 904.906076][T13270] ? __update_load_avg_blocked_se+0x670/0x670 [ 904.912148][T13270] ? __thp_get_unmapped_area+0x190/0x190 [ 904.917773][T13270] ? mark_held_locks+0x100/0x100 [ 904.922707][T13270] ? pud_val+0x85/0x100 [ 904.926872][T13270] ? pmd_val+0x100/0x100 [ 904.931105][T13270] __handle_mm_fault+0x38cc/0x5610 [ 904.936220][T13270] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 904.941770][T13270] ? check_preemption_disabled+0x48/0x290 [ 904.947617][T13270] ? handle_mm_fault+0x3cc/0xc80 [ 904.952566][T13270] ? lock_downgrade+0xbe0/0xbe0 [ 904.957424][T13270] ? kasan_check_read+0x11/0x20 [ 904.962273][T13270] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 904.968264][T13270] ? rcu_read_unlock_special+0x380/0x380 [ 904.973896][T13270] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 904.980130][T13270] ? check_preemption_disabled+0x48/0x290 [ 904.985836][T13270] handle_mm_fault+0x4ec/0xc80 [ 904.990595][T13270] ? __handle_mm_fault+0x5610/0x5610 [ 904.995890][T13270] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 905.001606][T13270] __get_user_pages+0x8f7/0x1e10 [ 905.006561][T13270] ? follow_page_mask+0x1f40/0x1f40 [ 905.011767][T13270] ? lock_release+0xc40/0xc40 [ 905.016451][T13270] ? _raw_spin_unlock_irq+0x28/0x90 [ 905.021661][T13270] ? down_read+0x8d/0x120 [ 905.026425][T13270] ? get_user_pages_unlocked+0xfe/0x5d0 [ 905.031973][T13270] ? __down_interruptible+0x740/0x740 [ 905.037353][T13270] get_user_pages_unlocked+0x2fd/0x5d0 [ 905.042828][T13270] ? get_user_pages_longterm+0x630/0x630 [ 905.048466][T13270] ? __switch_to_asm+0x34/0x70 [ 905.053227][T13270] ? __switch_to_asm+0x34/0x70 [ 905.057988][T13270] ? __switch_to_asm+0x40/0x70 [ 905.062754][T13270] ? __switch_to_asm+0x34/0x70 [ 905.067498][T13270] ? __switch_to_asm+0x40/0x70 [ 905.072254][T13270] ? __switch_to_asm+0x34/0x70 [ 905.077020][T13270] ? __switch_to_asm+0x40/0x70 [ 905.081808][T13270] get_user_pages_fast+0x317/0x460 [ 905.086924][T13270] ? __get_user_pages_fast+0x3f0/0x3f0 [ 905.092386][T13270] ? pci_mmcfg_check_reserved+0x170/0x170 [ 905.098120][T13270] iov_iter_get_pages+0x2df/0x1290 [ 905.103228][T13270] ? retint_kernel+0x2d/0x2d [ 905.107807][T13270] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 905.113439][T13270] ? kernel_fpu_begin+0x220/0x220 [ 905.118462][T13270] ? memcpy+0x46/0x50 [ 905.122435][T13270] ? poly1305_simd_update+0x69/0x240 [ 905.127712][T13270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 905.133945][T13270] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 905.139672][T13270] ? iov_iter_advance+0x354/0x1490 [ 905.144787][T13270] af_alg_make_sg+0x9f/0x4b0 [ 905.149376][T13270] ? iov_iter_npages+0xf20/0xf20 [ 905.154310][T13270] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 905.159499][T13270] ? crypto_poly1305_init+0x1d/0xc0 [ 905.164690][T13270] hash_sendmsg+0x469/0xad0 [ 905.169205][T13270] ? hash_recvmsg+0xa60/0xa60 [ 905.173891][T13270] sock_sendmsg+0xdd/0x130 [ 905.178335][T13270] ___sys_sendmsg+0x7ec/0x910 [ 905.183016][T13270] ? copy_msghdr_from_user+0x570/0x570 [ 905.188485][T13270] ? ksys_dup3+0x660/0x660 [ 905.193134][T13270] ? fget_raw+0x20/0x20 [ 905.197402][T13270] ? __mutex_unlock_slowpath+0x195/0x870 [ 905.203062][T13270] ? wait_for_completion+0x810/0x810 [ 905.208342][T13270] ? __fdget+0x1b/0x20 [ 905.212399][T13270] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 905.218646][T13270] ? sockfd_lookup_light+0xc2/0x160 [ 905.223856][T13270] __sys_sendmsg+0x112/0x270 [ 905.228431][T13270] ? __ia32_sys_shutdown+0x80/0x80 [ 905.233557][T13270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 905.239629][T13270] ? trace_hardirqs_off_caller+0x300/0x300 [ 905.245423][T13270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 905.250882][T13270] __x64_sys_sendmsg+0x78/0xb0 [ 905.255655][T13270] do_syscall_64+0x1a3/0x800 [ 905.260238][T13270] ? syscall_return_slowpath+0x5f0/0x5f0 [ 905.265863][T13270] ? prepare_exit_to_usermode+0x232/0x3b0 [ 905.271585][T13270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 905.277136][T13270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 905.283035][T13270] RIP: 0033:0x457ec9 [ 905.286926][T13270] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 905.306509][T13270] RSP: 002b:00007f8ade2fbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 905.314911][T13270] RAX: ffffffffffffffda RBX: 00007f8ade2fbc90 RCX: 0000000000457ec9 [ 905.322882][T13270] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 905.330836][T13270] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 905.338787][T13270] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ade2fc6d4 [ 905.346755][T13270] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 [ 905.407020][T13284] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:13:59 executing program 0 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:13:59 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfX\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:13:59 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000000)=0x37) 20:13:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 905.493610][T13286] hfs: can't find a HFS filesystem on dev loop3 [ 905.641003][T13292] FAULT_INJECTION: forcing a failure. [ 905.641003][T13292] name failslab, interval 1, probability 0, space 0, times 0 [ 905.694038][T13286] hfs: can't find a HFS filesystem on dev loop3 [ 905.711980][T13292] CPU: 1 PID: 13292 Comm: syz-executor0 Not tainted 5.0.0-rc1-next-20190114 #11 [ 905.714385][T13308] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 905.721034][T13292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.721041][T13292] Call Trace: [ 905.721063][T13292] dump_stack+0x1db/0x2d0 [ 905.721084][T13292] ? dump_stack_print_info.cold+0x20/0x20 [ 905.753265][T13292] ? lockdep_hardirqs_on+0x415/0x5d0 [ 905.758561][T13292] ? retint_kernel+0x2d/0x2d [ 905.763156][T13292] ? trace_hardirqs_on_caller+0xc0/0x310 [ 905.768803][T13292] should_fail.cold+0xa/0x14 [ 905.773405][T13292] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 905.779233][T13292] ? retint_kernel+0x2d/0x2d [ 905.783835][T13292] __should_failslab+0x121/0x190 [ 905.788782][T13292] should_failslab+0x9/0x14 20:13:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:13:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x50, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 905.793291][T13292] kmem_cache_alloc+0x2be/0x710 [ 905.798147][T13292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 905.804394][T13292] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 905.810650][T13292] ptlock_alloc+0x20/0x70 [ 905.814996][T13292] pte_alloc_one+0x6d/0x1a0 [ 905.819544][T13292] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 905.825391][T13292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 905.831748][T13292] ? perf_pmu_enable+0xdd/0x120 [ 905.836605][T13292] ? __thp_get_unmapped_area+0x190/0x190 [ 905.842241][T13292] ? mark_held_locks+0xb1/0x100 [ 905.847084][T13292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 905.852546][T13292] ? lockdep_hardirqs_on+0x415/0x5d0 [ 905.857825][T13292] ? pud_val+0x85/0x100 [ 905.861995][T13292] ? pmd_val+0x100/0x100 [ 905.866224][T13292] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 905.872368][T13292] __handle_mm_fault+0x38cc/0x5610 [ 905.877465][T13292] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 905.883008][T13292] ? handle_mm_fault+0x3cc/0xc80 [ 905.887958][T13292] ? lock_downgrade+0xbe0/0xbe0 [ 905.892810][T13292] ? kasan_check_read+0x11/0x20 [ 905.897643][T13292] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 905.903619][T13292] ? rcu_read_unlock_special+0x380/0x380 [ 905.909238][T13292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 905.915593][T13292] ? check_preemption_disabled+0x48/0x290 [ 905.921302][T13292] handle_mm_fault+0x4ec/0xc80 [ 905.926053][T13292] ? __handle_mm_fault+0x5610/0x5610 [ 905.931321][T13292] ? __get_user_pages+0x47b/0x1e10 [ 905.936416][T13292] __get_user_pages+0x8f7/0x1e10 [ 905.941342][T13292] ? follow_page_mask+0x1f40/0x1f40 [ 905.946528][T13292] ? lock_release+0xc40/0xc40 [ 905.951198][T13292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 905.956651][T13292] ? down_read+0x8d/0x120 [ 905.960978][T13292] ? get_user_pages_unlocked+0xfe/0x5d0 [ 905.966511][T13292] ? __down_interruptible+0x740/0x740 [ 905.971884][T13292] get_user_pages_unlocked+0x2fd/0x5d0 [ 905.977348][T13292] ? get_user_pages_longterm+0x630/0x630 [ 905.982981][T13292] ? get_user_pages_fast+0x258/0x460 [ 905.988249][T13292] get_user_pages_fast+0x317/0x460 [ 905.993341][T13292] ? __get_user_pages_fast+0x3f0/0x3f0 [ 905.998807][T13292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.004256][T13292] ? lockdep_hardirqs_on+0x415/0x5d0 [ 906.009532][T13292] iov_iter_get_pages+0x2df/0x1290 [ 906.014625][T13292] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 906.020764][T13292] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 906.026411][T13292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.031882][T13292] ? retint_kernel+0x2d/0x2d [ 906.036467][T13292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 906.042185][T13292] ? iov_iter_advance+0x354/0x1490 [ 906.047295][T13292] af_alg_make_sg+0x9f/0x4b0 [ 906.051893][T13292] ? iov_iter_npages+0xf20/0xf20 [ 906.056826][T13292] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 906.062019][T13292] ? iov_iter_advance+0x1e/0x1490 [ 906.067040][T13292] hash_sendmsg+0x469/0xad0 [ 906.071526][T13292] ? hash_recvmsg+0xa60/0xa60 [ 906.076203][T13292] sock_sendmsg+0xdd/0x130 [ 906.080601][T13292] ___sys_sendmsg+0x7ec/0x910 [ 906.085263][T13292] ? copy_msghdr_from_user+0x570/0x570 [ 906.090707][T13292] ? ksys_dup3+0x660/0x660 [ 906.095133][T13292] ? retint_kernel+0x2d/0x2d [ 906.099726][T13292] ? __fget_light+0x13a/0x420 [ 906.104409][T13292] ? fget_raw+0x20/0x20 [ 906.108552][T13292] ? __mutex_unlock_slowpath+0x195/0x870 [ 906.114169][T13292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.119620][T13292] ? lockdep_hardirqs_on+0x415/0x5d0 [ 906.124922][T13292] ? __fdget+0x1b/0x20 [ 906.129010][T13292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 906.135235][T13292] ? sockfd_lookup_light+0xc2/0x160 [ 906.140415][T13292] __sys_sendmsg+0x112/0x270 [ 906.145013][T13292] ? __ia32_sys_shutdown+0x80/0x80 [ 906.150135][T13292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.155585][T13292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 906.161659][T13292] ? trace_hardirqs_off_caller+0x300/0x300 [ 906.167471][T13292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.172920][T13292] __x64_sys_sendmsg+0x78/0xb0 [ 906.177698][T13292] do_syscall_64+0x1a3/0x800 [ 906.182274][T13292] ? syscall_return_slowpath+0x5f0/0x5f0 [ 906.187886][T13292] ? prepare_exit_to_usermode+0x232/0x3b0 [ 906.193589][T13292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 906.199121][T13292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 906.205017][T13292] RIP: 0033:0x457ec9 [ 906.208900][T13292] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 906.228488][T13292] RSP: 002b:00007f8ade2fbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 906.236879][T13292] RAX: ffffffffffffffda RBX: 00007f8ade2fbc90 RCX: 0000000000457ec9 [ 906.244850][T13292] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 906.252809][T13292] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 906.260761][T13292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ade2fc6d4 [ 906.268712][T13292] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:14:00 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:00 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) getsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:14:00 executing program 0 (fault-call:4 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 906.368609][T13312] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:00 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x4, 0x12000) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7ff, 0x0) r2 = dup(r0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}, {0x0, 'cpu'}, {0x2b, 'rdma'}]}, 0x11) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) 20:14:00 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfa\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 906.550283][T13334] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 906.580662][T13331] hfs: can't find a HFS filesystem on dev loop3 20:14:00 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x42, 0x6000000000000000, 0x19c, 0x507}) [ 906.652958][T13325] FAULT_INJECTION: forcing a failure. [ 906.652958][T13325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 906.666517][T13325] CPU: 0 PID: 13325 Comm: syz-executor0 Not tainted 5.0.0-rc1-next-20190114 #11 [ 906.675535][T13325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.675541][T13325] Call Trace: [ 906.675560][T13325] dump_stack+0x1db/0x2d0 [ 906.675579][T13325] ? dump_stack_print_info.cold+0x20/0x20 [ 906.675597][T13325] ? should_fail.cold+0x5/0x14 [ 906.675613][T13325] should_fail.cold+0xa/0x14 [ 906.675629][T13325] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 906.704146][T13325] ? arch_local_save_flags+0x50/0x50 [ 906.704161][T13325] ? lock_release+0xc40/0xc40 [ 906.704178][T13325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.704206][T13325] should_fail_alloc_page+0x50/0x60 [ 906.704222][T13325] __alloc_pages_nodemask+0x323/0xdc0 [ 906.704240][T13325] ? retint_kernel+0x2d/0x2d [ 906.704255][T13325] ? trace_hardirqs_on_caller+0xc0/0x310 20:14:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x60, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 906.704274][T13325] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 906.704311][T13325] ? get_task_policy.part.0+0xc/0xb0 [ 906.750954][T13325] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 906.768152][T13325] alloc_pages_current+0x107/0x210 [ 906.773270][T13325] ? do_huge_pmd_anonymous_page+0x350/0x1830 [ 906.779252][T13325] pte_alloc_one+0x1b/0x1a0 [ 906.779275][T13325] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 906.779292][T13325] ? trace_hardirqs_on_caller+0x310/0x310 [ 906.779317][T13325] ? __thp_get_unmapped_area+0x190/0x190 20:14:00 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 906.779340][T13325] ? retint_kernel+0x2d/0x2d [ 906.779360][T13325] ? pud_val+0x85/0x100 [ 906.809675][T13325] ? pmd_val+0x100/0x100 [ 906.813945][T13325] ? __handle_mm_fault+0x2fb/0x5610 [ 906.819156][T13325] __handle_mm_fault+0x38cc/0x5610 [ 906.824284][T13325] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 906.829837][T13325] ? handle_mm_fault+0x3cc/0xc80 [ 906.834798][T13325] ? lock_downgrade+0xbe0/0xbe0 [ 906.839652][T13325] ? kasan_check_read+0x11/0x20 [ 906.844504][T13325] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 906.850501][T13325] ? rcu_read_unlock_special+0x380/0x380 [ 906.856170][T13325] handle_mm_fault+0x4ec/0xc80 [ 906.860957][T13325] ? __handle_mm_fault+0x5610/0x5610 [ 906.866266][T13325] __get_user_pages+0x8f7/0x1e10 [ 906.871222][T13325] ? follow_page_mask+0x1f40/0x1f40 [ 906.876431][T13325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.881907][T13325] ? retint_kernel+0x2d/0x2d [ 906.886513][T13325] get_user_pages_unlocked+0x2fd/0x5d0 [ 906.891991][T13325] ? get_user_pages_longterm+0x630/0x630 [ 906.897629][T13325] ? get_user_pages_fast+0x258/0x460 [ 906.902935][T13325] get_user_pages_fast+0x317/0x460 [ 906.908053][T13325] ? __get_user_pages_fast+0x3f0/0x3f0 [ 906.908073][T13325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.908092][T13325] ? lockdep_hardirqs_on+0x415/0x5d0 [ 906.908122][T13325] iov_iter_get_pages+0x2df/0x1290 [ 906.924275][T13325] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 906.924305][T13325] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 906.924325][T13325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 906.924349][T13325] ? retint_kernel+0x2d/0x2d [ 906.924371][T13325] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 906.924386][T13325] ? iov_iter_advance+0x354/0x1490 [ 906.924407][T13325] af_alg_make_sg+0x9f/0x4b0 [ 906.924427][T13325] ? iov_iter_npages+0xf20/0xf20 [ 906.957013][T13325] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 906.976886][T13325] ? hash_sendmsg+0x53c/0xad0 [ 906.981595][T13325] hash_sendmsg+0x469/0xad0 [ 906.981618][T13325] ? hash_recvmsg+0xa60/0xa60 [ 906.981640][T13325] sock_sendmsg+0xdd/0x130 [ 906.981657][T13325] ___sys_sendmsg+0x7ec/0x910 [ 906.981678][T13325] ? copy_msghdr_from_user+0x570/0x570 [ 906.981693][T13325] ? ksys_dup3+0x660/0x660 [ 906.981732][T13325] ? fget_raw+0x20/0x20 [ 906.981752][T13325] ? __mutex_unlock_slowpath+0x195/0x870 [ 906.981771][T13325] ? wait_for_completion+0x810/0x810 [ 906.995334][T13325] ? __fdget+0x1b/0x20 [ 906.995352][T13325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 906.995370][T13325] ? sockfd_lookup_light+0xc2/0x160 [ 906.995390][T13325] __sys_sendmsg+0x112/0x270 [ 906.995408][T13325] ? __ia32_sys_shutdown+0x80/0x80 [ 906.995440][T13325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 906.995455][T13325] ? trace_hardirqs_off_caller+0x300/0x300 [ 906.995474][T13325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 907.009972][T13325] __x64_sys_sendmsg+0x78/0xb0 [ 907.009993][T13325] do_syscall_64+0x1a3/0x800 [ 907.010013][T13325] ? syscall_return_slowpath+0x5f0/0x5f0 [ 907.010032][T13325] ? prepare_exit_to_usermode+0x232/0x3b0 [ 907.010059][T13325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 907.010085][T13325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.010100][T13325] RIP: 0033:0x457ec9 20:14:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 907.103942][T13325] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 907.123636][T13325] RSP: 002b:00007f8ade2fbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 907.132065][T13325] RAX: ffffffffffffffda RBX: 00007f8ade2fbc90 RCX: 0000000000457ec9 [ 907.140038][T13325] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 907.148013][T13325] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 907.155988][T13325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ade2fc6d4 [ 907.163966][T13325] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:14:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x8, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r1) 20:14:01 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:01 executing program 0 (fault-call:4 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x70, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 907.327673][T13372] FAULT_INJECTION: forcing a failure. [ 907.327673][T13372] name failslab, interval 1, probability 0, space 0, times 0 [ 907.353303][T13373] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 907.378592][T13373] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 907.411631][T13372] CPU: 1 PID: 13372 Comm: syz-executor0 Not tainted 5.0.0-rc1-next-20190114 #11 [ 907.420684][T13372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 907.430731][T13372] Call Trace: [ 907.430755][T13372] dump_stack+0x1db/0x2d0 [ 907.430775][T13372] ? dump_stack_print_info.cold+0x20/0x20 [ 907.430800][T13372] should_fail.cold+0xa/0x14 [ 907.448667][T13372] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 907.454483][T13372] ? ___might_sleep+0x1e7/0x310 [ 907.454501][T13372] ? arch_local_save_flags+0x50/0x50 [ 907.454527][T13372] __should_failslab+0x121/0x190 [ 907.454548][T13372] should_failslab+0x9/0x14 [ 907.474069][T13372] kmem_cache_alloc+0x2be/0x710 [ 907.478910][T13372] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 907.485153][T13372] ptlock_alloc+0x20/0x70 [ 907.489470][T13372] pte_alloc_one+0x6d/0x1a0 [ 907.493961][T13372] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 907.499750][T13372] ? print_usage_bug+0xd0/0xd0 [ 907.504495][T13372] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 907.510203][T13372] ? __thp_get_unmapped_area+0x190/0x190 [ 907.515822][T13372] ? mark_held_locks+0x100/0x100 [ 907.520748][T13372] ? add_lock_to_list.isra.0+0x450/0x450 [ 907.526368][T13372] ? pud_val+0x85/0x100 [ 907.530507][T13372] ? pmd_val+0x100/0x100 [ 907.534730][T13372] ? follow_page_mask+0x1c61/0x1f40 [ 907.539919][T13372] __handle_mm_fault+0x38cc/0x5610 [ 907.545024][T13372] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 907.550552][T13372] ? check_preemption_disabled+0x48/0x290 [ 907.556258][T13372] ? handle_mm_fault+0x3cc/0xc80 [ 907.561189][T13372] ? lock_downgrade+0xbe0/0xbe0 [ 907.566022][T13372] ? kasan_check_read+0x11/0x20 [ 907.570865][T13372] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 907.576831][T13372] ? rcu_read_unlock_special+0x380/0x380 [ 907.582454][T13372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 907.588690][T13372] ? check_preemption_disabled+0x48/0x290 [ 907.594399][T13372] handle_mm_fault+0x4ec/0xc80 [ 907.599150][T13372] ? __handle_mm_fault+0x5610/0x5610 [ 907.604422][T13372] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 907.610125][T13372] __get_user_pages+0x8f7/0x1e10 [ 907.615057][T13372] ? follow_page_mask+0x1f40/0x1f40 [ 907.620237][T13372] ? lock_release+0xc40/0xc40 [ 907.624913][T13372] ? down_read+0x8d/0x120 [ 907.629228][T13372] ? get_user_pages_unlocked+0xfe/0x5d0 [ 907.634759][T13372] ? __down_interruptible+0x740/0x740 [ 907.640117][T13372] get_user_pages_unlocked+0x2fd/0x5d0 [ 907.645564][T13372] ? get_user_pages_longterm+0x630/0x630 [ 907.651178][T13372] ? lockdep_hardirqs_on+0x415/0x5d0 [ 907.656447][T13372] ? retint_kernel+0x2d/0x2d [ 907.661023][T13372] ? trace_hardirqs_on_caller+0xc0/0x310 [ 907.666649][T13372] ? mark_held_locks+0x100/0x100 [ 907.671570][T13372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 907.677016][T13372] get_user_pages_fast+0x317/0x460 [ 907.682114][T13372] ? __get_user_pages_fast+0x3f0/0x3f0 [ 907.687576][T13372] iov_iter_get_pages+0x2df/0x1290 [ 907.692680][T13372] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 907.698298][T13372] ? kernel_fpu_begin+0x220/0x220 [ 907.703312][T13372] ? memcpy+0x46/0x50 [ 907.707280][T13372] ? poly1305_simd_update+0x69/0x240 [ 907.712552][T13372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 907.718774][T13372] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 907.724476][T13372] ? iov_iter_advance+0x354/0x1490 [ 907.729593][T13372] af_alg_make_sg+0x9f/0x4b0 [ 907.734175][T13372] ? iov_iter_npages+0xf20/0xf20 [ 907.739099][T13372] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 907.744290][T13372] ? crypto_poly1305_init+0x1d/0xc0 [ 907.749484][T13372] hash_sendmsg+0x469/0xad0 [ 907.753975][T13372] ? hash_recvmsg+0xa60/0xa60 [ 907.758651][T13372] sock_sendmsg+0xdd/0x130 [ 907.763052][T13372] ___sys_sendmsg+0x7ec/0x910 [ 907.767730][T13372] ? copy_msghdr_from_user+0x570/0x570 [ 907.773172][T13372] ? ksys_dup3+0x660/0x660 [ 907.777587][T13372] ? fget_raw+0x20/0x20 [ 907.781736][T13372] ? __mutex_unlock_slowpath+0x195/0x870 [ 907.787355][T13372] ? wait_for_completion+0x810/0x810 [ 907.792627][T13372] ? __fdget+0x1b/0x20 [ 907.796676][T13372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 907.802898][T13372] ? sockfd_lookup_light+0xc2/0x160 [ 907.808081][T13372] __sys_sendmsg+0x112/0x270 [ 907.812656][T13372] ? __ia32_sys_shutdown+0x80/0x80 [ 907.817762][T13372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.823813][T13372] ? trace_hardirqs_off_caller+0x300/0x300 [ 907.829609][T13372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 907.835051][T13372] __x64_sys_sendmsg+0x78/0xb0 [ 907.839799][T13372] do_syscall_64+0x1a3/0x800 [ 907.844386][T13372] ? syscall_return_slowpath+0x5f0/0x5f0 [ 907.850004][T13372] ? prepare_exit_to_usermode+0x232/0x3b0 [ 907.855713][T13372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 907.861249][T13372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 907.867125][T13372] RIP: 0033:0x457ec9 [ 907.871005][T13372] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 907.890590][T13372] RSP: 002b:00007f8ade2fbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 907.898985][T13372] RAX: ffffffffffffffda RBX: 00007f8ade2fbc90 RCX: 0000000000457ec9 [ 907.906952][T13372] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 907.914907][T13372] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 907.922874][T13372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ade2fc6d4 20:14:01 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfb\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:01 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/156, 0x9c) 20:14:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 907.930838][T13372] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 20:14:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x90, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 907.991266][T13390] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x776, 0x4, &(0x7f00000011c0)=[{&(0x7f0000000080)="c6041a61895ac5f05ed3a2f26256accf3be42bdcee7741", 0x17, 0x5}, {&(0x7f00000000c0)="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", 0x1000, 0x34c}, {&(0x7f0000001300)="ac377023c6b7e38bc1184176e201d3ba50fc9f0684b6e12dadc275356b5ab6adbddf1ef8bd066de2c54938b59be9f08554261ae87fdb4055d8364c02a39f693537b755ff89a5e238d7410232ca00db5b41020c6f855c6ce6a0a036bb0a5fc37eca65dd5b3a908524c5bc102f2160c8f803bbddc3862b0093a27eb12c398d45", 0x7f, 0x6}, {&(0x7f0000001140)="e416a8c326a33d6e031ee010b8e3af0347d8048de739cef857466c1a4a0d999e4926cee602a7b5fba7e4cfb531f1c89863d9f519a64ea970a53f7b80b7ad533ba47df125", 0x44, 0xed88}], 0x220028, &(0x7f0000001240)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@context={'context', 0x3d, 'user_u'}}]}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000001380)={0xffff, 0xf, 0x4, 0x20, {0x77359400}, {0x7, 0x0, 0x1ff, 0x9, 0x3, 0x81, "a67e75b0"}, 0x1, 0x1, @planes=&(0x7f00000010c0)={0x6de5, 0x82, @fd=r1, 0x1}, 0x4}) 20:14:02 executing program 0 (fault-call:4 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:02 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 908.181151][T13406] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x80, 0x40) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x4e24, @multicast1}}) socket$nl_route(0x10, 0x3, 0x0) [ 908.418066][T13426] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 908.452154][T13414] FAULT_INJECTION: forcing a failure. [ 908.452154][T13414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:14:02 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfc\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 908.482349][T13425] hfs: can't find a HFS filesystem on dev loop3 [ 908.484026][T13414] CPU: 0 PID: 13414 Comm: syz-executor0 Not tainted 5.0.0-rc1-next-20190114 #11 [ 908.497640][T13414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.507693][T13414] Call Trace: [ 908.510995][T13414] dump_stack+0x1db/0x2d0 [ 908.515339][T13414] ? dump_stack_print_info.cold+0x20/0x20 [ 908.521069][T13414] ? add_lock_to_list.isra.0+0x450/0x450 [ 908.526727][T13414] should_fail.cold+0xa/0x14 20:14:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xa0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 908.531325][T13414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 908.537146][T13414] ? arch_local_save_flags+0x50/0x50 [ 908.542459][T13414] ? lock_release+0xc40/0xc40 [ 908.547145][T13414] ? mark_held_locks+0xb1/0x100 [ 908.552016][T13414] should_fail_alloc_page+0x50/0x60 [ 908.557222][T13414] __alloc_pages_nodemask+0x323/0xdc0 [ 908.562595][T13414] ? print_usage_bug+0xd0/0xd0 [ 908.567371][T13414] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 908.573097][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.578572][T13414] ? retint_kernel+0x2d/0x2d [ 908.583185][T13414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 908.589430][T13414] alloc_pages_current+0x107/0x210 [ 908.594542][T13414] pte_alloc_one+0x1b/0x1a0 [ 908.599041][T13414] do_huge_pmd_anonymous_page+0xc0e/0x1830 [ 908.604852][T13414] ? retint_kernel+0x2d/0x2d [ 908.609439][T13414] ? __thp_get_unmapped_area+0x190/0x190 [ 908.615067][T13414] ? pud_val+0x64/0x100 [ 908.619219][T13414] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 908.624787][T13414] ? pud_val+0x85/0x100 [ 908.628954][T13414] ? pmd_val+0x100/0x100 [ 908.633195][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.638662][T13414] __handle_mm_fault+0x38cc/0x5610 [ 908.643786][T13414] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 908.649340][T13414] ? check_preemption_disabled+0x48/0x290 [ 908.655073][T13414] ? handle_mm_fault+0x3cc/0xc80 [ 908.660011][T13414] ? lock_downgrade+0xbe0/0xbe0 [ 908.664864][T13414] ? kasan_check_read+0x11/0x20 [ 908.669712][T13414] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 908.675769][T13414] ? rcu_read_unlock_special+0x380/0x380 [ 908.681402][T13414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.687633][T13414] ? check_preemption_disabled+0x48/0x290 [ 908.693360][T13414] handle_mm_fault+0x4ec/0xc80 [ 908.698127][T13414] ? __handle_mm_fault+0x5610/0x5610 [ 908.703418][T13414] ? __get_user_pages+0x3a0/0x1e10 [ 908.708540][T13414] __get_user_pages+0x8f7/0x1e10 [ 908.713483][T13414] ? follow_page_mask+0x1f40/0x1f40 [ 908.718676][T13414] ? lock_release+0xc40/0xc40 [ 908.723348][T13414] ? _raw_spin_unlock_irq+0x28/0x90 [ 908.728559][T13414] ? down_read+0x8d/0x120 [ 908.732890][T13414] ? get_user_pages_unlocked+0xfe/0x5d0 [ 908.738447][T13414] ? __down_interruptible+0x740/0x740 [ 908.743826][T13414] get_user_pages_unlocked+0x2fd/0x5d0 [ 908.749298][T13414] ? get_user_pages_longterm+0x630/0x630 [ 908.754942][T13414] ? lockdep_hardirqs_on+0x415/0x5d0 [ 908.760210][T13414] ? retint_kernel+0x2d/0x2d [ 908.764809][T13414] get_user_pages_fast+0x317/0x460 [ 908.769928][T13414] ? __get_user_pages_fast+0x3f0/0x3f0 [ 908.775371][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.780817][T13414] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 908.786958][T13414] iov_iter_get_pages+0x2df/0x1290 [ 908.792067][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.797538][T13414] ? csum_and_copy_to_iter+0x1ba0/0x1ba0 [ 908.803167][T13414] ? retint_kernel+0x2d/0x2d [ 908.807762][T13414] ? iov_iter_advance+0x1ce/0x1490 [ 908.812870][T13414] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 908.818319][T13414] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 908.824030][T13414] ? iov_iter_advance+0x354/0x1490 [ 908.829139][T13414] af_alg_make_sg+0x9f/0x4b0 [ 908.833729][T13414] ? iov_iter_npages+0xf20/0xf20 [ 908.838667][T13414] ? af_alg_wmem_wakeup+0x7b0/0x7b0 [ 908.843864][T13414] hash_sendmsg+0x469/0xad0 [ 908.848380][T13414] ? hash_recvmsg+0xa60/0xa60 [ 908.853056][T13414] sock_sendmsg+0xdd/0x130 [ 908.857485][T13414] ___sys_sendmsg+0x7ec/0x910 [ 908.862166][T13414] ? copy_msghdr_from_user+0x570/0x570 [ 908.867632][T13414] ? ksys_dup3+0x660/0x660 [ 908.872055][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.877526][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.882982][T13414] ? fget_raw+0x20/0x20 [ 908.887143][T13414] ? __mutex_unlock_slowpath+0x195/0x870 [ 908.892800][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.898268][T13414] ? __fdget+0x1b/0x20 [ 908.902338][T13414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.908589][T13414] ? sockfd_lookup_light+0xc2/0x160 [ 908.913797][T13414] __sys_sendmsg+0x112/0x270 [ 908.918394][T13414] ? __ia32_sys_shutdown+0x80/0x80 [ 908.923527][T13414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.929587][T13414] ? trace_hardirqs_off_caller+0x300/0x300 [ 908.935374][T13414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 908.940817][T13414] __x64_sys_sendmsg+0x78/0xb0 [ 908.945565][T13414] do_syscall_64+0x1a3/0x800 [ 908.950153][T13414] ? syscall_return_slowpath+0x5f0/0x5f0 [ 908.955788][T13414] ? prepare_exit_to_usermode+0x232/0x3b0 [ 908.961505][T13414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 908.967126][T13414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.973009][T13414] RIP: 0033:0x457ec9 [ 908.976914][T13414] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 908.996498][T13414] RSP: 002b:00007f8ade2fbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 909.004896][T13414] RAX: ffffffffffffffda RBX: 00007f8ade2fbc90 RCX: 0000000000457ec9 [ 909.012870][T13414] RDX: 0000000000000000 RSI: 0000000020001f00 RDI: 0000000000000005 [ 909.020837][T13414] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:14:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:03 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xe13b, 0x200) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 909.029002][T13414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8ade2fc6d4 [ 909.036972][T13414] R13: 00000000004c53a4 R14: 00000000004d8e48 R15: 0000000000000006 [ 909.149084][T13440] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 909.164147][T13425] hfs: can't find a HFS filesystem on dev loop3 20:14:03 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:03 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'hwsim0\x00', {0x2, 0x4e22, @loopback}}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x6, &(0x7f0000001380)=[{&(0x7f00000000c0)="0b172852aaf6363ae80e64ed93d01603499a7d998853ba25125a729a1fa759c261f2aca2a45d73278a54fe5a890a7c44f05c83c7f9bb708b0e9732ca74fb20634696ee5ac87786f540c98091deffb00abbd176681593ba9cd703db23d9a977ab3bfc16", 0x63}, {&(0x7f0000000140)="83c8827d0184f45c3e61b9c0b3b3af984a565dbf9e0f527e63b101cddd264b08ac029c4b36e3fbfa4909194520bceb7028412153835a35b2d012ef3b5c02f060a6af5b5ed41f0abc603a82a3fbb01659b526df5f90abc902a150ac544b1b0125cfba28801c", 0x65, 0xef4}, {&(0x7f00000001c0)="0f2650ea9d057bec618491c4e20c34e213e56f73f72c4c8c0211611142dc873f4308c3ea9c56c981e30af553e9b62c1b45e14ba9572064a97832726044948061b6f4679549ccbee71850af8b50ec1eff077419e8c818fe02dc736350f89917a57b792ed49f2eb485bc266e4bab3c48e95e70ec3fdb4aad4af93049d6f2211db5215420136c7942d18f", 0x89, 0x6}, {&(0x7f0000000280)="cde7b1dcfc0f1e456131baef6c320ffcc28e9ae2a3f120af893db837b65f7c5c6a76be4792135b72930fdc31369549e05cd41d0617590584daafa9a15b77602cc9847ba02910c366f5ab6c26d26c3bf207791456d9d38526fb515a3652c8d2e22b4193c31bf7bd12dcfdea77f272a6058e8daf9655ce592f19cd3eb7b9bb972d927bdeea534d6326e4683f13867d94a5456ba0a42accb1", 0x97, 0x2}, {&(0x7f0000000340)="5ffb63ef9d53ba091668c520d9e501053b5c9eb35707ab0802b56a87aacf29a9", 0x20, 0x3}, {&(0x7f0000000380)="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", 0x1000, 0xffff}], 0x1800000, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000001440)) 20:14:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:03 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfd\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xb0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 909.390411][T13465] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 909.479915][T13468] hfs: can't find a HFS filesystem on dev loop3 [ 909.501928][T13464] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 909.580142][T13485] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:03 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfh\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:03 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fstat(r2, &(0x7f00000000c0)) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:03 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 909.771517][T13500] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:03 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfi\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 909.910197][T13510] hfs: can't find a HFS filesystem on dev loop3 20:14:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) write$smack_current(r1, &(0x7f0000000000)='ppp0\x00', 0x5) 20:14:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xc0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x3, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 910.038255][T13518] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 910.054008][T13518] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 910.115929][T13510] hfs: can't find a HFS filesystem on dev loop3 20:14:04 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:04 executing program 1: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) r1 = getuid() getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) fchown(r0, r1, r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000200)='&\x00', 0x2, 0x2) r4 = dup(r3) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, 0x0) [ 910.283249][T13540] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:04 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfk\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) chdir(&(0x7f0000000000)='./file0\x00') ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xd0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 910.415004][T13549] hfs: can't find a HFS filesystem on dev loop3 [ 910.522524][T13559] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 910.564529][T13549] hfs: can't find a HFS filesystem on dev loop3 20:14:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 20:14:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:04 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:04 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x800, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0xff, r2, 0x10003, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000040)={0x80000000000000, r3}) [ 910.836729][T13586] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x4, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:04 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfl\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 910.880487][T13587] hfs: can't find a HFS filesystem on dev loop3 20:14:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x60, 0x2) [ 911.027301][T13587] hfs: can't find a HFS filesystem on dev loop3 [ 911.039234][T13608] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xe0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000000)=""/142) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:05 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 911.207051][T13618] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000040)={{0x8, 0x7, 0x0, 0x9, 0x81, 0x5}, 0x3e0000000}) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="010040000810"], &(0x7f00000000c0)=0x6) 20:14:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 911.371177][T13624] hfs: can't find a HFS filesystem on dev loop3 20:14:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x5, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:05 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfo\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) set_mempolicy(0x1, &(0x7f0000000000), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e21, @multicast1}], 0x10) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 911.448387][T13641] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:05 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 911.654974][T13658] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) fcntl$setflags(r1, 0x2, 0x1) [ 911.695952][T13660] hfs: can't find a HFS filesystem on dev loop3 20:14:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000000)={0x4, 0x9, 0xff, 0x0, 0x0, [], [], [], 0x1, 0xdaf0}) 20:14:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xf0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x6, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:05 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfp\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 911.857914][T13660] hfs: can't find a HFS filesystem on dev loop3 [ 911.944571][T13681] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:06 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x7fffffff) dup(r0) 20:14:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:06 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x7, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2001, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:06 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) [ 912.159975][T13699] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 912.248430][T13699] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 912.259970][T13711] hfs: can't find a HFS filesystem on dev loop3 20:14:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:06 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserft\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:06 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20200, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x7, 0x5, 0x2, 0x3, 0x0, 0xb38e, 0x40001, 0x1, 0xd087, 0x4700, 0x40, 0x407, 0x3f, 0x3ff, 0x9, 0x7fff, 0x9, 0x3a9bf042, 0x200, 0x6, 0x9, 0x1000, 0x7f, 0x9, 0x47, 0xffff, 0x9, 0x643a, 0x6, 0x102, 0x7, 0xfb, 0x100, 0x5, 0x4, 0x8, 0x0, 0x3, 0x2, @perf_config_ext={0x3f, 0x8}, 0x1000, 0x1547, 0xffffffffffff7fff, 0x2, 0x8, 0x6, 0x25}, r0, 0xb, r0, 0x3) ioctl$RTC_AIE_ON(r0, 0x7001) dup(r1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2008}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x110, r3, 0x11, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa149}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x93e5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4fb1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x30000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3d4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd5d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r4 = dup(r2) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, 0x0) 20:14:06 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 912.439233][T13725] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x8, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 912.577766][T13738] hfs: can't find a HFS filesystem on dev loop3 20:14:06 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x8000, 0x4a8, 0x2aa, 0x4}, 0x10) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:06 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfu\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 912.678417][T13747] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 912.736376][T13738] hfs: can't find a HFS filesystem on dev loop3 20:14:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:06 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 912.919955][T13766] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x9, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x200003d0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:07 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x2800) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xe) socket$pppoe(0x18, 0x1, 0x0) r2 = dup(r0) getsockname$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r3 = signalfd4(r0, &(0x7f0000000100)={0x9}, 0x8, 0x80800) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) sendfile(r3, r3, 0x0, 0x9) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000040)=0x2) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x9, 0x4) [ 912.968697][T13771] hfs: can't find a HFS filesystem on dev loop3 [ 913.016661][T13766] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:07 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xf, "6f0e828ab0ee4f502c25c9b06cd5eb"}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={r2, 0x4}, &(0x7f00000000c0)=0x8) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:07 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfx\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:07 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:07 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 913.271266][T13796] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 913.386662][T13803] hfs: can't find a HFS filesystem on dev loop3 20:14:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:07 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = semget$private(0x0, 0x0, 0x40) semctl$IPC_INFO(r2, 0x2, 0x3, &(0x7f0000000100)=""/176) sendto$ax25(r1, &(0x7f0000000000)="19f5219a32e51ac868d5fa91da62e88db9ac14e43cc6d02eb56c7864678d3d1bec39679e5a013af38ece130070fc71c9021512b9430ceee3b0bf50b032712cff158477bd27605444d16cc5e3e4dc07a83c59f93d66a81ceb74c7fd1e2b0377fe4c024d95f3de2dc2bfd13ded2c0827d7942becdd40784b2590375df8d2d8164181817708013fdf4ae807bf009ba9e0b8d95d26f5aad6502855224a00f35ace1c5da5c41367a0b570c1d97a4ab1e11903be7843daa621425df4f6d3d448ad2dab4ab3c73a1ce0337208273f018c1248", 0xcf, 0x800, 0x0, 0x0) r3 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000003c0)={{0x6, r3, r4, r5, r6, 0x82, 0x3ff}, 0x9, 0x56a9, 0x100}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 913.493377][T13812] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 913.512331][T13803] hfs: can't find a HFS filesystem on dev loop3 20:14:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xa, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:07 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfy\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:07 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:07 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x800, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r1, 0x300, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, 0x0) 20:14:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x10, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 913.795542][T13829] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 913.845955][T13831] hfs: can't find a HFS filesystem on dev loop3 20:14:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:08 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x100000001, 0x0, "68eb46176874c3e983b1358ec060df7f6d7db7316949a0ac6f0654903de8ab7d4954c468dc564740f294be7ba61cf7fd8afef148c64b35104c83e2ea80547fd8fb152a53a4219e7f4d3b49317a5749e9"}, 0xd8) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) [ 914.029509][T13831] hfs: can't find a HFS filesystem on dev loop3 20:14:08 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfz\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 914.077583][T13859] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:08 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'lapb0\x00', 0x5}) r1 = dup(r0) r2 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r2, 0x9, &(0x7f0000000040)={0x40, 0x8, 0x4}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 20:14:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xb, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:08 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x100000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:08 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, 0x0) [ 914.356594][T13883] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 914.398463][T13884] hfs: can't find a HFS filesystem on dev loop3 20:14:08 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 914.530191][T13884] hfs: can't find a HFS filesystem on dev loop3 20:14:08 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf\x8e\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:08 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 914.580423][T13902] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xc, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:08 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101080, 0x0) 20:14:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 914.827321][T13928] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:08 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200800, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x17000, &(0x7f00000000c0), 0x1, r2, 0x8}) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xf1, 0x0) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) r4 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x100000001) 20:14:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 914.972691][T13925] hfs: can't find a HFS filesystem on dev loop3 20:14:09 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserf\x90\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 915.092662][T13939] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 915.130016][T13925] hfs: can't find a HFS filesystem on dev loop3 20:14:09 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x200, 0x0) recvmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000300)=""/58, 0x3a}, {&(0x7f0000000340)=""/21, 0x15}, {&(0x7f0000000380)=""/50, 0x32}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/233, 0xe9}, {&(0x7f00000014c0)=""/149, 0x95}], 0x6, &(0x7f0000001600)=""/138, 0x8a}, 0x4}, {{&(0x7f00000016c0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000001900)=[{&(0x7f0000001740)=""/166, 0xa6}, {&(0x7f0000001800)=""/254, 0xfe}], 0x2, &(0x7f0000001940)=""/182, 0xb6}, 0x105c}, {{&(0x7f0000001a00)=@tipc=@id, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a80)=""/6, 0x6}, {&(0x7f0000001ac0)=""/88, 0x58}, {&(0x7f0000001b40)=""/248, 0xf8}], 0x3, &(0x7f0000001c80)=""/213, 0xd5}, 0x40}], 0x3, 0x2021, 0x0) fstat(r0, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000001ec0)={0x11, 0x0, 0x0}, &(0x7f0000001f00)=0x14, 0x80800) sendmsg$nl_xfrm(r1, &(0x7f0000002200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80001000}, 0xc, &(0x7f00000021c0)={&(0x7f0000001f40)=@expire={0x248, 0x18, 0x10, 0x70bd29, 0x25dfdbfc, {{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x4e21, 0x4, 0x4e20, 0x8, 0x0, 0x20, 0x80, 0x11, r2, r3}, {@in=@multicast1, 0x4d2, 0xff}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {0xfffffffffffffff7, 0x1ff, 0x800, 0x9, 0x3, 0xffff, 0x7, 0x153f}, {0x1000, 0xfff, 0x8, 0x1}, {0xa6e, 0x3ff}, 0x70bd27, 0x3506, 0xa, 0x7, 0x30, 0x20}, 0x8000}, [@offload={0xc, 0x1c, {r4, 0x3}}, @mark={0xc, 0x15, {0x35075a, 0xe90}}, @srcaddr={0x14, 0xd, @in=@broadcast}, @coaddr={0x14, 0xe, @in=@empty}, @algo_crypt={0x104, 0x2, {{'lrw-serpent-avx\x00'}, 0x5c8, "98e975340749ec4dfd87fd2dab6227d1c44c54201cc69468e52ff7f5c6874a52b7ddcbce71298018b1902050ccf8cd81deb947c98a58c8ed927fdfb3d3069a51d0595b70fa28cd7ce9672e9036fc7e8ca7d86cd55fe88147ce368b0a00e4ce5e961721a448b86303ee28a6017c37cbe2adfb169e1b0d0ed101b288f3f8361243f85d2aaf43ccd1223e016bbc8557273f5e346907eda3cd5c11a9388e0c2cd8b7ac339c9788b30a28d11a070b62eabf2669132eca2833b7267c"}}, @lastused={0xc, 0xf, 0x7fffffff}]}, 0x248}, 0x1, 0x0, 0x0, 0x4010}, 0x40) r5 = dup(r0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f00000000c0)) ioctl$sock_bt_hidp_HIDPCONNDEL(r5, 0x400448c9, 0x0) connect$bt_rfcomm(r5, &(0x7f0000000080)={0x1f, {0x9, 0x7, 0x56e, 0x200, 0x7, 0x8}, 0x1}, 0xa) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:14:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:09 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 915.279923][T13954] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xd, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:09 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000000)=""/185, &(0x7f00000000c0)=0xb9) 20:14:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x10000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:09 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) [ 915.465009][T13962] hfs: can't find a HFS filesystem on dev loop3 [ 915.488315][T13976] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:09 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 915.553534][T13976] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8dffffff, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:09 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000000)={0x1, 0x0, [0x401, 0xd9, 0x1, 0x5, 0x7ff, 0x100, 0x200]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 915.692151][T13962] hfs: can't find a HFS filesystem on dev loop3 [ 915.724697][T13995] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:09 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:09 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xe, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:09 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, 0x0) 20:14:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xf0ffffff, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 915.935262][T14008] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:10 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x109000, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r2 = dup(r0) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) fcntl$addseals(r3, 0x409, 0xa) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, 0x0) getpeername$tipc(r2, &(0x7f0000000000), &(0x7f0000000040)=0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x6, 0x3}, 0x14) 20:14:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 916.089308][T14020] hfs: can't find a HFS filesystem on dev loop3 20:14:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x5, 0x0, [{0xc83a, 0x3, 0x0, 0x0, @irqchip={0x2f, 0xf965}}, {0x9, 0x0, 0x0, 0x0, @adapter={0x81, 0x4ea, 0x2, 0x7fffffff, 0xe027}}, {0xff, 0x0, 0x0, 0x0, @sint={0x266e3c7c, 0x24540000}}, {0x40, 0x3, 0x0, 0x0, @irqchip={0x9, 0x2}}, {0x3, 0x2, 0x0, 0x0, @msi={0x20, 0xffffffff, 0x3}}]}) r2 = getpid() sched_rr_get_interval(r2, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 916.241534][T14038] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 916.260902][T14020] hfs: can't find a HFS filesystem on dev loop3 20:14:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffff7f, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:10 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x05', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) socketpair(0x8, 0x7, 0x3e176113, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xf, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 916.719055][T14068] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 916.751890][T14071] hfs: can't find a HFS filesystem on dev loop3 20:14:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='\\@*@\x00', 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000140), 0x0, r3) dup3(r1, r0, 0x80000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0xa9, 0x4) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 916.920253][T14071] hfs: can't find a HFS filesystem on dev loop3 [ 916.971561][T14093] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x06', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:11 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x620000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='memory.events\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000680)) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) 20:14:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffff8d, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)=0xe1) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 917.148342][T14104] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x30, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 917.225296][T14108] hfs: can't find a HFS filesystem on dev loop3 20:14:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 917.317136][T14108] hfs: can't find a HFS filesystem on dev loop3 [ 917.340510][T14127] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\a', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000180)={r2, 0x5, &(0x7f0000000080)=[0x10000, 0x3, 0x400, 0x9e0, 0x800], &(0x7f00000000c0)=[0x0, 0x2, 0x1, 0x8000, 0x2], 0x50, 0xa, 0x2, &(0x7f0000000100)=[0xffffffffffffffc1, 0x4558, 0x1000, 0x6, 0x1f, 0x7, 0x2, 0x611, 0x0, 0x0], &(0x7f0000000140)=[0xfffffffffffeffff]}) 20:14:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xfffffff0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 917.613251][T14144] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 917.667224][T14151] hfs: can't find a HFS filesystem on dev loop3 20:14:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0x3, 0x4) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 917.771945][T14151] hfs: can't find a HFS filesystem on dev loop3 20:14:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\t', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 917.828332][T14163] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x50, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:11 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8401, 0x0) flock(r0, 0x8) r1 = dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)={0xff, 0x0, [], {0x0, @reserved}}) 20:14:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 918.015463][T14176] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x10000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 918.066262][T14177] hfs: can't find a HFS filesystem on dev loop3 20:14:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:12 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) socket$tipc(0x1e, 0x7, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) [ 918.226488][T14194] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:12 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\n', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:12 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:12 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@initdev, @in6}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x60, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x800000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 918.544770][T14228] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:12 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0x405, &(0x7f0000000440)=""/183}, 0x48) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000080)={'ip6_vti0\x00', {0x2, 0x0, @remote}}) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r2}) r4 = accept(r1, &(0x7f0000000240)=@isdn, &(0x7f00000002c0)=0x80) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000300)=0x11, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$alg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000006c0)="9aa4fdd4a60fb2d1354e08b51c9b77a871dbf568ae88ca62ab36348510402b5380d4e6908a4b6645fc203f05d1fcf2c5d88b281df7607439ddcd8ecaeb6faf9e2758729cfe83dc1ef5b2d6edd64a7f68494a580185080696a5ecbd7ac6ae783673377776763fd0444870b08403806b5e79253d8f79af5dd5a3ed0658d27e2087c85d7a9e32955027ab9b1044de1eb6ae24f6b541eba51ad9ff18d4ce71341bd40cd43de0375546e809abfcfbd13617e188149b19cc1b4b0cc2ac25efa7d0fcfc66913d6508e85ae160193adb70e4c46e88f22a11fec8d62f20df96fce5372c25a5f97d521529906a0fcd685b30345e12b3b56e4e3806a0ca74bef65f474d304a14fdc962cf1774cc7fa5b9eb12c35fd35b1de9e29954c8e229da3358172503bb7e9e421d2223cd3436b844bfd3f2ab11bd6d7cae0c2bc3b97f482ccdd54ad825a17e9e20a0186214912c6e09db6e7931b7705590b436cf761d3571d23af6ab053b51c94acaebf09f686608e9b249cb71d2f3490bf614206ae3ac", 0x17a}], 0x1, &(0x7f0000001a80)}, 0x0) close(r3) r6 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x42801, 0x0) close(r6) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss, @mss, @mss, @mss, @mss], 0x5) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) r7 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r7, 0x400448c9, 0x0) 20:14:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 918.605334][T14227] hfs: can't find a HFS filesystem on dev loop3 20:14:12 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x70, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 918.755149][T14237] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 918.781076][T14241] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 918.867543][T14227] hfs: can't find a HFS filesystem on dev loop3 [ 918.977564][T14258] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:13 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:13 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2a04, 0x204400) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs#', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 919.221583][T14275] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 919.235926][T14267] hfs: can't find a HFS filesystem on dev loop3 20:14:13 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x8, 0x28000) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=0x0, &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYBLOB="0f00006291d0a2e5935196888b87acb2c470dc"], &(0x7f00000002c0)=0x17) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3ff, 0x1]) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x420c01, 0x0) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/72, 0x48}, &(0x7f00000000c0), 0x1}, 0x20) getsockname$packet(r2, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) setsockopt$inet6_mreq(r4, 0x29, 0x1f, &(0x7f0000000d00)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r5}, 0x14) 20:14:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x1000000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 919.320679][T14267] hfs: can't find a HFS filesystem on dev loop3 20:14:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:13 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:13 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) [ 919.499295][T14295] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsH', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x90, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:13 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f00000007c0)={0x0, 0x0}) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000008c0), &(0x7f0000000900)=0x0, &(0x7f0000000940)) sendmsg$netlink(r1, &(0x7f0000000a00)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="08030000170008002dbd7000ffdbdf25e0b10cebf6cb8f938284be0d4f415475c34273e7b3d1d60fc883d572775023079d6d706ff6b08aeac716c4bbf6058880fd548698afd7147817e133d395cd81effc2f020cca19c92632483638729e14e8e248b6ad3c18c8071090ab3fcae1956285351ab7a62d824a82bd8ee85b3708c27fc51d0f5807b7035cf4b37404d632dc5c1b15ea4aed6411068ce4abbebe28dafbc21521e5df7b2b7750d09788e636498f8ab3e30bb77fc9aeb17091ab7a1719d15e51b2736e2923b34e3e1b0471321e6e57af15a6792bc68fbf69fe65cdffb0e11155ac21fe9e22bff96f91a9221513e50b25554e0f136e7784069de43ca310bdfd97366d96d57310d8d37ea01687361f919911d032a65d4282800ab7bde6c8bf9b7e41c96dc2065567e0ee9ec949bc2e3b0701c3c62903580b3659d141c06ee1b70100d14548b839ad4039170a18d2bdf4fb493acc94eceae5fe1a704cab623f2ad07475bf4915a16d00456d610d248a28a12d253a9a4399b7a35a0617d7c594c659071f2f150e2570e323bb87f0a2c240cc535551e070bbf1c7c7c6b3f9eb72a6d8dfc9a7fce508006600ffffffff08006e00", @ANYRES32=r0, @ANYBLOB="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"], 0x308}, {&(0x7f00000003c0)={0x104, 0x1b, 0x200, 0x70bd2d, 0x25dfdbfc, "", [@typed={0xf4, 0x4, @binary="c871100ab379c05cfc90e7b4093b631d990cd2f893b5f2d02d186672733ff28724c1bcb25098d19422d8ed4e5d47c42bb21111715e14048456f1d80229139cc71cc8e6a09ee1ea1732d64c83d1b901d3bf45d16040526d0331de5dc27820ac6818f243adecb8e269febc45238817ed2d7f4663106e3ae2ca7d4ce48f11ff236f9904a3e3036f57f52f8600e6be5c277ea258709607b29e66e2ade7b8f828ae975a627b461e9a60934e67b53ef178c9cf3b367a5dc9ea046c24d36951b6a54b41ac247ef00d9b413aa7fd5609647d20137b5e717d36d442ab46fdfff7374aeb84626f38ef8bf8f610f8d6e0e0bd3e0f79"}]}, 0x104}, {&(0x7f0000000500)={0x50, 0x1b, 0x400, 0x70bd26, 0x25dfdbfc, "", [@generic="c0fe0eda62feb5ff8d282a7c7770f7a6d7d40b083c3305c5cd5c1f853c46617b51eeff2dfcf5f35cd026ae871fae494f57b5e65fee4c7798b9111b763fd8"]}, 0x50}], 0x3, &(0x7f0000000980)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x70, 0x4}, 0x20000080) r8 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r8, 0x400448c9, 0x0) 20:14:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8000000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 919.742779][T14307] hfs: can't find a HFS filesystem on dev loop3 [ 919.764159][T14318] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 919.835477][T14307] hfs: can't find a HFS filesystem on dev loop3 20:14:13 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000040)={0x0, 0x3, 0x10001}) 20:14:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xa0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:13 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 919.983083][T14339] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:14 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsL', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 920.065176][T14346] hfs: can't find a HFS filesystem on dev loop3 20:14:14 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000040)={0x2}) r2 = dup(r0) ioctl$KDDISABIO(r2, 0x4b37) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) 20:14:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8dffffff00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xb0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 920.237296][T14346] hfs: can't find a HFS filesystem on dev loop3 [ 920.272359][T14366] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:14 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl(r1, 0x4, &(0x7f0000000000)="e31a9be5846de24571fa9ecf666466673d17a621e6b65c76011db807467b6135") ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:14 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:14 executing program 1: r0 = msgget(0x2, 0x1) r1 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x40000) msgrcv(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000c410cc0000000000000087c25ac5e24f8e89000000000000000000000000001fa2d6fe0e704d5bc3e3fa2b9c10dfd91dc333"], 0x47, 0x3, 0x2000) r2 = dup(0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0)=0x40, 0x4) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000000)={0x7, 0x76, 0x5, 0x0, 0x4, 0xff}) 20:14:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 920.477626][T14384] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xf0ffffff00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xc0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:14 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsN', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 920.623939][T14395] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:14 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = shmget(0x3, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) [ 920.714181][T14389] hfs: can't find a HFS filesystem on dev loop3 20:14:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 920.906303][T14389] hfs: can't find a HFS filesystem on dev loop3 [ 920.912141][T14423] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:15 executing program 1: getegid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/fscreate\x00') r2 = openat(r1, &(0x7f0000000340)='./file0\x00', 0x800000000101000, 0x8) flistxattr(r0, &(0x7f0000000000)=""/222, 0xde) r3 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x181, 0x40080) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0xc971, 0x18c4, 0xce76791, 0x5, 0x10001, 0x6, 0x12, 0x7}}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffffffffffff}, 0x117, 0x1009}}, 0x20) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000004c0)=0xd000) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$FUSE_POLL(r3, &(0x7f0000000480)={0x18, 0x0, 0x3, {0x3e}}, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000005c0), 0xffffffffffffffa6) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000240)=0x6868000, 0x4) dup(0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, 0x0) 20:14:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsZ', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xd0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffff7f00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:15 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x101, 0x4000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200)=0x400, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000000c0)={r2}) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000100)=0x5a5b) r3 = dup(r1) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, 0x0) [ 921.218195][T14441] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 921.283876][T14437] hfs: can't find a HFS filesystem on dev loop3 20:14:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000080)={r2, 0x7fffffff}, 0x8) 20:14:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffffff00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 921.446440][T14458] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x401, 0x3, 0x9, 0x5}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r2, 0x100000001, 0xa, [0x3, 0x8, 0x6, 0x100000000, 0xffffffffffffffc7, 0x7, 0x4, 0x20, 0x7, 0x80]}, 0x1c) 20:14:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs`', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 921.625536][T14477] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000000)={0x2, "1d28"}, 0x3) [ 921.733199][T14482] hfs: can't find a HFS filesystem on dev loop3 20:14:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xe0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x2) ptrace$peekuser(0x3, 0x0, 0x3) getpriority(0x1, 0x0) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2=0xe0000004}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsh', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:16 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000040)={0x5, 0xffffffffffff0000, 0x20, 0x2635, 0x3, 0x3}) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) [ 921.925018][T14506] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 921.978175][T14482] hfs: can't find a HFS filesystem on dev loop3 [ 922.059070][T14517] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:16 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:16 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) io_setup(0x80000000, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 922.254357][T14531] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xf0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:16 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) recvfrom$rose(r1, &(0x7f0000000000)=""/44, 0x2c, 0x10002, &(0x7f0000000040)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, [@default, @default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x40) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xca8f, 0x4) [ 922.368922][T14540] hfs: can't find a HFS filesystem on dev loop3 20:14:16 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsl', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 922.421207][T14548] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 922.538492][T14540] hfs: can't find a HFS filesystem on dev loop3 20:14:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2=0xe0000005}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:16 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:16 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfst', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 922.679045][T14570] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 922.884198][T14591] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2=0xe0000010}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:17 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2001, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsz', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 923.061525][T14603] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 923.205513][T14613] hfs: can't find a HFS filesystem on dev loop3 20:14:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 20:14:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 923.321000][T14623] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 923.351441][T14613] hfs: can't find a HFS filesystem on dev loop3 20:14:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xea', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:17 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x200003d0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x3, 0x7, 0xf000000000000000, 0x2, 0x1, 0x4}, 0x5}) [ 923.648188][T14650] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 923.680569][T14656] hfs: can't find a HFS filesystem on dev loop3 20:14:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x16', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 923.844215][T14656] hfs: can't find a HFS filesystem on dev loop3 20:14:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000000)="baa3094d372d4fa68c9530239d156522d4d96f55965dd0aef1cb65c4082d98ca047d59add058f1ebebb52fbf84f05c3e2a60c6cf824513f7ef198c31c74e991424d9ba4a34b307e14434a2c0b233eb0cffba2ec53c8603727187cd0aec5f026990a58b5137592473b90c0f51823c60919e22f0943825b0d8ed3f2b6390791774ea5138baeddd9a0726aba2a1e38b692f95c2785c339200a0144aced2d63c4919a6ea6cd9c819dee9bf27b7498591e745f0ee9da52e91d12e6a2eb72d45b4cde8b2ffe6013cc2dfbbb5ff9cd066fcdea6", 0xd0) [ 923.903070][T14671] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 924.026455][T14682] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 924.103981][T14693] hfs: can't find a HFS filesystem on dev loop3 20:14:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:18 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsH', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 924.259728][T14693] hfs: can't find a HFS filesystem on dev loop3 [ 924.279346][T14709] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@remote}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) 20:14:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) ioctl$sock_bt_hci(r0, 0x800448f0, &(0x7f0000000000)="201dbb099724") 20:14:18 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsp', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 924.549776][T14729] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 924.568439][T14724] hfs: can't find a HFS filesystem on dev loop3 20:14:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x12) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, 0x0) 20:14:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 924.796442][T14751] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x10, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:18 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:18 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x8e', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 924.970260][T14759] hfs: can't find a HFS filesystem on dev loop3 20:14:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 925.030584][T14769] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x100000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 925.224327][T14783] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:19 executing program 1: 20:14:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:19 executing program 1: [ 925.445528][T14796] hfs: can't find a HFS filesystem on dev loop3 20:14:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xb2', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 925.501473][T14806] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 925.701988][T14796] hfs: can't find a HFS filesystem on dev loop3 [ 925.729459][T14823] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:19 executing program 1: 20:14:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xca', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:19 executing program 1: [ 925.948529][T14832] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:20 executing program 1: [ 926.075993][T14838] hfs: can't find a HFS filesystem on dev loop3 20:14:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x10000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 926.216959][T14838] hfs: can't find a HFS filesystem on dev loop3 [ 926.227255][T14856] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:20 executing program 1: 20:14:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xd8', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 926.358948][T14869] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:20 executing program 1: 20:14:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8dffffff, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:20 executing program 1: [ 926.562141][T14882] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 926.596223][T14887] hfs: can't find a HFS filesystem on dev loop3 20:14:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xf9', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:20 executing program 1: [ 926.792154][T14887] hfs: can't find a HFS filesystem on dev loop3 [ 926.808719][T14905] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:20 executing program 1: 20:14:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:21 executing program 1: 20:14:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs.', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 927.093518][T14924] hfs: can't find a HFS filesystem on dev loop3 [ 927.100283][T14928] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xf0ffffff, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:21 executing program 1: [ 927.217319][T14924] hfs: can't find a HFS filesystem on dev loop3 20:14:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:21 executing program 1: [ 927.380785][T14946] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffff7f, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:21 executing program 1: 20:14:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 927.562839][T14955] hfs: can't find a HFS filesystem on dev loop3 [ 927.563416][T14960] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:21 executing program 1: [ 927.680680][T14955] hfs: can't find a HFS filesystem on dev loop3 20:14:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 927.751252][T14980] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:21 executing program 1: 20:14:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffff8d, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 927.945444][T14996] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xaf', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:22 executing program 1: [ 928.016359][T14989] hfs: can't find a HFS filesystem on dev loop3 20:14:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xfffffff0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:22 executing program 1: [ 928.206213][T14989] hfs: can't find a HFS filesystem on dev loop3 [ 928.243428][T15017] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:22 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:22 executing program 1: r0 = socket$inet(0x2, 0x4008000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 20:14:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 928.485120][T15034] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xcc', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 928.539514][T15030] hfs: can't find a HFS filesystem on dev loop3 20:14:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x4, 0x0, 0x4) close(0xffffffffffffffff) [ 928.733256][T15030] hfs: can't find a HFS filesystem on dev loop3 20:14:22 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x10000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 928.959325][T15069] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 928.988913][T15066] hfs: can't find a HFS filesystem on dev loop3 20:14:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 929.092664][T15076] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 929.093912][T15066] hfs: can't find a HFS filesystem on dev loop3 [ 929.145456][T15090] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 929.169194][T15076] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device 20:14:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x800000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 929.291802][T15076] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 929.370338][T15106] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 929.393718][T15076] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 929.536140][T15113] hfs: can't find a HFS filesystem on dev loop3 [ 929.577596][T15076] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 929.602287][T15076] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 929.612531][T15123] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 929.671255][T15113] hfs: can't find a HFS filesystem on dev loop3 [ 929.691482][T15076] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x1000000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 929.732499][T15076] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 929.820031][T15132] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:23 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x06', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 930.018748][T15141] hfs: can't find a HFS filesystem on dev loop3 [ 930.051094][T15150] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8000000000000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 930.130391][T15141] hfs: can't find a HFS filesystem on dev loop3 20:14:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:24 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x7f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:14:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 930.309269][T15174] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:24 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfsn', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x8dffffff00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 930.542557][T15191] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:24 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:24 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x80', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:24 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 930.897223][T15218] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:25 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xf0ffffff00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xee', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 931.184099][T15248] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:25 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:25 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) 20:14:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xf0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 931.456090][T15270] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffff7f00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 931.675117][T15291] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 931.692643][T15283] hfs: can't find a HFS filesystem on dev loop3 20:14:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 931.805103][T15302] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:25 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) 20:14:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\xfc', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 931.996203][T15319] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 932.030799][T15320] hfs: can't find a HFS filesystem on dev loop3 20:14:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0xffffffff00000000, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:26 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 932.257103][T15346] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 932.286462][T15320] hfs: can't find a HFS filesystem on dev loop3 20:14:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 20:14:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x2, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 932.491144][T15361] hfs: can't find a HFS filesystem on dev loop3 [ 932.528357][T15356] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 932.552388][T15356] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 932.587277][T15370] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 932.608351][T15356] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 932.628753][T15361] hfs: can't find a HFS filesystem on dev loop3 20:14:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) 20:14:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 932.683312][T15356] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2=0xe0000004}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 932.836632][T15385] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 932.846992][T15385] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 932.958519][T15356] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 932.973718][T15401] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 932.987276][T15388] hfs: can't find a HFS filesystem on dev loop3 20:14:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2=0xe0000005}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 933.238166][T15388] hfs: can't find a HFS filesystem on dev loop3 [ 933.242610][T15419] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 933.270098][T15418] REISERFS (device loop4): found reiserfs format "3.6" with standard journal 20:14:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) [ 933.329366][T15418] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 933.434790][T15418] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 933.513429][T15418] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 933.533087][T15436] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 933.627217][T15438] hfs: can't find a HFS filesystem on dev loop3 [ 933.638875][T15418] REISERFS (device loop4): found reiserfs format "3.6" with standard journal 20:14:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2=0xe0000010}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 933.667924][T15418] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 933.726279][T15418] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 933.748542][T15454] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 933.780571][T15418] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 933.794347][T15438] hfs: can't find a HFS filesystem on dev loop3 20:14:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) [ 933.984616][T15471] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 934.066975][T15478] hfs: can't find a HFS filesystem on dev loop3 20:14:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:28 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 934.225984][T15478] hfs: can't find a HFS filesystem on dev loop3 20:14:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) [ 934.287719][T15495] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 934.409262][T15499] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 934.461326][T15499] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 934.461979][T15510] hfs: can't find a HFS filesystem on dev loop3 20:14:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 934.556274][T15499] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 934.575040][T15520] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 934.626083][T15499] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 934.699172][T15510] hfs: can't find a HFS filesystem on dev loop3 20:14:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 934.759078][T15537] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 934.807752][T15537] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x5, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x21, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) close(r2) close(r1) 20:14:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) [ 934.910648][T15499] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 934.947826][T15499] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 935.031222][T15499] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 935.035134][T15553] hfs: can't find a HFS filesystem on dev loop3 [ 935.061927][T15499] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:29 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x21020017f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_int(r2, 0x0, 0xf, &(0x7f00000001c0), 0x4) accept4$packet(r1, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) 20:14:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 935.219503][T15567] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 935.256112][T15553] hfs: can't find a HFS filesystem on dev loop3 20:14:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:29 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa, 0x0, 0x0, 0x0, 0x0) 20:14:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x8, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 935.477319][T15588] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 935.501198][T15587] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 935.554675][T15587] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 935.597516][T15596] hfs: can't find a HFS filesystem on dev loop3 20:14:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 935.658080][T15587] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 935.713392][T15587] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 935.745516][T15605] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 935.745724][T15596] hfs: can't find a HFS filesystem on dev loop3 20:14:29 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe, 0x0, 0x0, 0x0, 0x0) 20:14:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x9, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 935.948191][T15587] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 935.980705][T15624] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 935.981540][T15621] hfs: can't find a HFS filesystem on dev loop3 20:14:30 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xa, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 936.118515][T15634] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 936.188281][T15621] hfs: can't find a HFS filesystem on dev loop3 [ 936.223230][T15642] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 936.254991][T15642] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 936.343792][T15642] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) 20:14:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 936.407937][T15654] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 936.431877][T15642] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 936.502649][T15658] hfs: can't find a HFS filesystem on dev loop3 [ 936.539134][T15666] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 936.701809][T15658] hfs: can't find a HFS filesystem on dev loop3 [ 936.748908][T15642] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 936.806672][T15642] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 936.822463][T15682] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 936.869050][T15642] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 936.898269][T15682] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 936.941289][T15642] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs ', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xb, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:31 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x23, 0x0, 0x0, 0x0, 0x0) 20:14:31 executing program 1: clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 937.114916][T15701] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 937.156655][T15696] hfs: can't find a HFS filesystem on dev loop3 20:14:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:31 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 937.237384][T15696] hfs: can't find a HFS filesystem on dev loop3 20:14:31 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) [ 937.406386][T15717] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xc, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x01', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 937.475299][T15717] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 937.649098][T15726] hfs: can't find a HFS filesystem on dev loop3 [ 937.663500][T15736] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xd, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 938.035881][T15726] hfs: can't find a HFS filesystem on dev loop3 [ 938.083556][T15758] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:32 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, 0x0) [ 938.261235][T15761] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 938.385192][T15771] hfs: can't find a HFS filesystem on dev loop3 [ 938.427057][T15767] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 938.454489][T15777] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 938.492979][T15767] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 938.508599][T15771] hfs: can't find a HFS filesystem on dev loop3 20:14:32 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x60, 0x0, 0x0, 0x0, 0x0) [ 938.576110][T15767] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 938.606138][T15767] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 939.019279][T15767] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 939.054780][T15797] hfs: can't find a HFS filesystem on dev loop3 [ 939.068045][T15767] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 939.097181][T15767] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xe, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 939.116549][T15767] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:33 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 939.206857][T15797] hfs: can't find a HFS filesystem on dev loop3 [ 939.216469][T15808] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:33 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, 0x0) 20:14:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xf, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 939.493663][T15822] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:33 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 939.559366][T15824] hfs: can't find a HFS filesystem on dev loop3 [ 939.690865][T15824] hfs: can't find a HFS filesystem on dev loop3 [ 939.707897][T15836] REISERFS (device loop4): found reiserfs format "3.6" with standard journal 20:14:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 939.739151][T15836] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 939.795159][T15836] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:33 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) [ 939.841698][T15836] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 939.872159][T15847] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 940.006972][T15836] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 940.021257][T15850] hfs: can't find a HFS filesystem on dev loop3 [ 940.188893][T15825] IPVS: ftp: loaded support on port[0] = 21 [ 940.213839][T15850] hfs: can't find a HFS filesystem on dev loop3 [ 940.588834][T15825] chnl_net:caif_netlink_parms(): no params data found [ 940.748974][T15825] bridge0: port 1(bridge_slave_0) entered blocking state [ 940.756129][T15825] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.767506][T15825] device bridge_slave_0 entered promiscuous mode [ 940.775294][T15825] bridge0: port 2(bridge_slave_1) entered blocking state [ 940.782570][T15825] bridge0: port 2(bridge_slave_1) entered disabled state [ 940.790172][T15825] device bridge_slave_1 entered promiscuous mode [ 940.936576][T15825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 940.946519][T15825] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 940.965036][T15825] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 940.973397][T15825] team0: Port device team_slave_0 added [ 941.106433][T15825] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 941.116562][T15825] team0: Port device team_slave_1 added [ 941.122725][T15825] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 941.130668][T15825] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 941.173577][T15825] device hsr_slave_0 entered promiscuous mode [ 941.222120][T15825] device hsr_slave_1 entered promiscuous mode [ 941.414040][T15825] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 941.421764][T15825] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 941.439372][T15825] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.446439][T15825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 941.453757][T15825] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.460786][T15825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 941.600548][T29307] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.608415][T29307] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.769331][T15825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 941.779944][T15825] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 941.788745][T15825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 941.795721][T32484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 941.796168][T32484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 941.813030][ T32] device bridge_slave_1 left promiscuous mode [ 941.819186][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.862779][ T32] device bridge_slave_0 left promiscuous mode [ 941.869001][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 945.435235][ T32] device hsr_slave_1 left promiscuous mode [ 945.505258][ T32] device hsr_slave_0 left promiscuous mode [ 945.577467][ T32] team0 (unregistering): Port device team_slave_1 removed [ 945.589026][ T32] team0 (unregistering): Port device team_slave_0 removed [ 945.601363][ T32] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 945.638677][ T32] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 945.735411][ T32] bond0 (unregistering): Released all slaves [ 945.847276][T15825] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 945.854171][T15825] 8021q: adding VLAN 0 to HW filter on device team0 [ 945.864661][T15825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 945.872642][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 945.881183][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 945.890002][ T7858] bridge0: port 1(bridge_slave_0) entered blocking state [ 945.897662][ T7858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 945.907614][T15825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 945.916471][ T7861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 945.925108][ T7861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 945.933618][ T7861] bridge0: port 2(bridge_slave_1) entered blocking state [ 945.940679][ T7861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 945.950700][T15825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 945.958461][T29307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 945.963148][T15825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 945.973920][T29307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 945.985319][T15825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 945.993584][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 946.002252][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 946.010547][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 946.020136][T15825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 946.029396][T29307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 946.030021][T29307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 946.047227][T15825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 946.057821][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 946.066396][ T7858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 946.075700][T15825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 946.090044][ T7861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 946.098622][ T7861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 946.107988][T15825] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 946.114823][T15825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 946.179972][T15825] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 946.199325][T15825] 8021q: adding VLAN 0 to HW filter on device batadv0 20:14:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x30, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:40 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, 0x0) [ 946.332959][T15878] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 946.380294][T15886] hfs: can't find a HFS filesystem on dev loop3 20:14:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 946.530664][T15899] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:40 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, 0x0) 20:14:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x50, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:14:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 946.919216][T15928] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 946.956647][T15922] hfs: can't find a HFS filesystem on dev loop3 20:14:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 947.085658][T15922] hfs: can't find a HFS filesystem on dev loop3 20:14:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:41 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) [ 947.189730][T15941] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 947.228234][T15940] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 20:14:41 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 947.268573][T15940] REISERFS warning (device loop1): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 947.306271][T15950] hfs: can't find a HFS filesystem on dev loop3 20:14:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x60, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 947.363811][T15940] REISERFS warning (device loop1): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 947.411972][T15956] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 947.441760][T15940] REISERFS warning (device loop1): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 947.455232][T15956] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 947.495831][T15950] hfs: can't find a HFS filesystem on dev loop3 [ 947.535584][T15968] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 947.573331][T15956] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:41 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 20:14:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 947.663451][T15956] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 947.788303][T15977] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 947.815802][T15975] hfs: can't find a HFS filesystem on dev loop3 20:14:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 947.852138][T15956] REISERFS (device loop4): found reiserfs format "3.6" with standard journal 20:14:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 947.937736][T15975] hfs: can't find a HFS filesystem on dev loop3 [ 947.944471][T15956] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 948.001499][T15991] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 948.029151][T15956] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 948.110149][T15956] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) [ 948.197092][T16000] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x70, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) 20:14:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0xd0, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 948.432207][T16007] hfs: can't find a HFS filesystem on dev loop3 [ 948.442789][T16011] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 948.482731][T16018] REISERFS (device loop4): found reiserfs format "3.6" with standard journal 20:14:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 948.524282][T16007] hfs: can't find a HFS filesystem on dev loop3 [ 948.533587][T16018] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 948.620588][T16018] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition 20:14:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) [ 948.667729][T16030] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 948.704466][T16018] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 948.853280][T16035] hfs: can't find a HFS filesystem on dev loop3 [ 948.862073][T16018] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 948.911846][T16018] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 948.926514][T16044] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:43 executing program 1 (fault-call:1 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 948.959029][T16035] hfs: can't find a HFS filesystem on dev loop3 [ 948.968158][T16018] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 949.015095][T16018] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to 20:14:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x90, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:43 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x900, 0x0, 0x0, 0x0, 0x0) 20:14:43 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 949.177065][T16060] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 949.187493][T16062] FAULT_INJECTION: forcing a failure. [ 949.187493][T16062] name failslab, interval 1, probability 0, space 0, times 0 [ 949.219600][T16062] CPU: 1 PID: 16062 Comm: syz-executor1 Not tainted 5.0.0-rc1-next-20190114 #11 [ 949.228659][T16062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.238722][T16062] Call Trace: [ 949.242036][T16062] dump_stack+0x1db/0x2d0 [ 949.246385][T16062] ? dump_stack_print_info.cold+0x20/0x20 [ 949.252137][T16062] ? add_lock_to_list.isra.0+0x450/0x450 [ 949.257781][T16062] ? kasan_check_read+0x11/0x20 [ 949.262645][T16062] should_fail.cold+0xa/0x14 [ 949.267252][T16062] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.273079][T16062] ? ___might_sleep+0x1e7/0x310 [ 949.277934][T16062] ? arch_local_save_flags+0x50/0x50 [ 949.283224][T16062] ? lock_acquire+0x1db/0x570 [ 949.287908][T16062] ? _raw_spin_unlock_irq+0x28/0x90 [ 949.293116][T16062] __should_failslab+0x121/0x190 [ 949.298066][T16062] should_failslab+0x9/0x14 [ 949.302594][T16062] kmem_cache_alloc_node+0x265/0x710 [ 949.307881][T16062] ? print_usage_bug+0xd0/0xd0 [ 949.312718][T16062] copy_process+0x4088/0x8740 [ 949.317403][T16062] ? print_usage_bug+0xd0/0xd0 [ 949.322166][T16062] ? __lock_acquire+0x572/0x4a10 [ 949.327104][T16062] ? process_measurement+0x268/0x1be0 [ 949.332482][T16062] ? print_usage_bug+0xd0/0xd0 [ 949.337252][T16062] ? __lock_acquire+0x572/0x4a10 [ 949.342203][T16062] ? __lock_acquire+0x572/0x4a10 [ 949.347160][T16062] ? __cleanup_sighand+0x70/0x70 [ 949.352100][T16062] ? mark_held_locks+0x100/0x100 [ 949.357046][T16062] ? __lock_acquire+0x572/0x4a10 [ 949.362000][T16062] ? mark_held_locks+0x100/0x100 [ 949.366964][T16062] ? __might_fault+0x12b/0x1e0 [ 949.371736][T16062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.377977][T16062] ? _parse_integer+0x139/0x190 [ 949.382835][T16062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 949.389075][T16062] ? _kstrtoull+0x17d/0x250 [ 949.393585][T16062] ? add_lock_to_list.isra.0+0x450/0x450 [ 949.399577][T16062] ? lock_downgrade+0xbe0/0xbe0 [ 949.404427][T16062] ? add_lock_to_list.isra.0+0x450/0x450 [ 949.410061][T16062] ? __check_object_size+0xa3/0x790 [ 949.415263][T16062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.421501][T16062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.427747][T16062] ? check_preemption_disabled+0x48/0x290 [ 949.433470][T16062] ? get_pid_task+0xd4/0x190 [ 949.438063][T16062] ? find_held_lock+0x35/0x120 [ 949.442826][T16062] ? get_pid_task+0xd4/0x190 [ 949.447416][T16062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.453660][T16062] ? add_lock_to_list.isra.0+0x450/0x450 [ 949.459289][T16062] ? kasan_check_read+0x11/0x20 [ 949.464143][T16062] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 949.470124][T16062] ? rcu_read_unlock_special+0x380/0x380 [ 949.475759][T16062] ? __f_unlock_pos+0x19/0x20 [ 949.480437][T16062] ? find_held_lock+0x35/0x120 [ 949.485205][T16062] ? __f_unlock_pos+0x19/0x20 [ 949.489888][T16062] ? proc_fail_nth_write+0xa0/0x220 [ 949.495091][T16062] ? lock_downgrade+0xbe0/0xbe0 [ 949.499950][T16062] ? vfs_write+0x2f0/0x580 [ 949.504379][T16062] ? kasan_check_write+0x14/0x20 [ 949.509317][T16062] ? __mutex_unlock_slowpath+0x195/0x870 [ 949.514956][T16062] _do_fork+0x1a9/0x1170 [ 949.519207][T16062] ? fork_idle+0x1d0/0x1d0 [ 949.523624][T16062] ? __sb_end_write+0xd9/0x110 [ 949.528406][T16062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 949.534645][T16062] ? fput+0x128/0x1a0 [ 949.538641][T16062] ? do_syscall_64+0x8c/0x800 [ 949.543316][T16062] ? do_syscall_64+0x8c/0x800 [ 949.547993][T16062] ? lockdep_hardirqs_on+0x415/0x5d0 [ 949.553285][T16062] ? trace_hardirqs_on+0xbd/0x310 [ 949.558306][T16062] ? __ia32_sys_read+0xb0/0xb0 [ 949.563186][T16062] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.569267][T16062] ? trace_hardirqs_off_caller+0x300/0x300 [ 949.575081][T16062] __x64_sys_clone+0xbf/0x150 [ 949.579765][T16062] do_syscall_64+0x1a3/0x800 [ 949.584358][T16062] ? syscall_return_slowpath+0x5f0/0x5f0 [ 949.589995][T16062] ? prepare_exit_to_usermode+0x232/0x3b0 [ 949.595730][T16062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 949.601285][T16062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.607175][T16062] RIP: 0033:0x457ec9 [ 949.611069][T16062] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.630673][T16062] RSP: 002b:00007f1c64115c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 949.639089][T16062] RAX: ffffffffffffffda RBX: 00007f1c64115c90 RCX: 0000000000457ec9 [ 949.647060][T16062] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000010000000 [ 949.655036][T16062] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 949.662996][T16062] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c641166d4 20:14:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 949.670961][T16062] R13: 00000000004be2a0 R14: 00000000004ce600 R15: 0000000000000003 20:14:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xa0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:43 executing program 1 (fault-call:1 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 949.744384][T16068] hfs: can't find a HFS filesystem on dev loop3 [ 949.799596][T16076] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 949.808585][T16079] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 949.886573][T16076] REISERFS warning (device loop4): reiserfs_fill_super: Filesystem cannot be mounted because it is bigger than the device [ 949.896144][T16090] FAULT_INJECTION: forcing a failure. [ 949.896144][T16090] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 949.965084][T16090] CPU: 1 PID: 16090 Comm: syz-executor1 Not tainted 5.0.0-rc1-next-20190114 #11 [ 949.974144][T16090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.984206][T16090] Call Trace: [ 949.987512][T16090] dump_stack+0x1db/0x2d0 [ 949.991854][T16090] ? dump_stack_print_info.cold+0x20/0x20 [ 949.997595][T16090] should_fail.cold+0xa/0x14 [ 950.002199][T16090] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.008028][T16090] ? arch_local_save_flags+0x50/0x50 [ 950.013315][T16090] ? lock_release+0xc40/0xc40 [ 950.018035][T16090] should_fail_alloc_page+0x50/0x60 [ 950.023244][T16090] __alloc_pages_nodemask+0x323/0xdc0 [ 950.028624][T16090] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 950.034344][T16090] ? rcu_pm_notify+0xd0/0xd0 [ 950.038947][T16090] ? rcu_read_lock_sched_held+0x110/0x130 [ 950.039819][T16076] REISERFS warning (device loop4): reiserfs_fill_super: You may need to run fsck or increase size of your LVM partition [ 950.044667][T16090] ? kmem_cache_alloc_node+0x347/0x710 [ 950.044688][T16090] ? print_usage_bug+0xd0/0xd0 [ 950.044714][T16090] copy_process+0x847/0x8740 [ 950.044728][T16090] ? print_usage_bug+0xd0/0xd0 [ 950.044747][T16090] ? __lock_acquire+0x572/0x4a10 [ 950.081758][T16090] ? process_measurement+0x268/0x1be0 [ 950.087140][T16090] ? print_usage_bug+0xd0/0xd0 [ 950.091916][T16090] ? __lock_acquire+0x572/0x4a10 [ 950.096863][T16090] ? __lock_acquire+0x572/0x4a10 [ 950.101823][T16090] ? __cleanup_sighand+0x70/0x70 [ 950.106783][T16090] ? mark_held_locks+0x100/0x100 [ 950.111732][T16090] ? __lock_acquire+0x572/0x4a10 [ 950.116693][T16090] ? mark_held_locks+0x100/0x100 [ 950.121806][T16090] ? __might_fault+0x12b/0x1e0 [ 950.126574][T16090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.132819][T16090] ? _parse_integer+0x139/0x190 [ 950.136541][T16076] REISERFS warning (device loop4): reiserfs_fill_super: Or may be you forgot to reboot after fdisk when it told you to [ 950.137696][T16090] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.137719][T16090] ? _kstrtoull+0x17d/0x250 [ 950.161817][T16090] ? add_lock_to_list.isra.0+0x450/0x450 [ 950.167449][T16090] ? lock_downgrade+0xbe0/0xbe0 [ 950.172298][T16090] ? add_lock_to_list.isra.0+0x450/0x450 [ 950.177922][T16090] ? __check_object_size+0xa3/0x790 [ 950.183116][T16090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.189479][T16090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.195809][T16090] ? check_preemption_disabled+0x48/0x290 [ 950.201536][T16090] ? get_pid_task+0xd4/0x190 [ 950.206130][T16090] ? find_held_lock+0x35/0x120 [ 950.210902][T16090] ? get_pid_task+0xd4/0x190 20:14:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xb0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 950.215496][T16090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.221743][T16090] ? add_lock_to_list.isra.0+0x450/0x450 [ 950.227369][T16090] ? kasan_check_read+0x11/0x20 [ 950.232209][T16090] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 950.238169][T16090] ? rcu_read_unlock_special+0x380/0x380 [ 950.243784][T16090] ? __f_unlock_pos+0x19/0x20 [ 950.248442][T16090] ? find_held_lock+0x35/0x120 [ 950.253183][T16090] ? __f_unlock_pos+0x19/0x20 [ 950.257845][T16090] ? proc_fail_nth_write+0xa0/0x220 [ 950.263024][T16090] ? lock_downgrade+0xbe0/0xbe0 [ 950.267855][T16090] ? vfs_write+0x2f0/0x580 [ 950.272255][T16090] ? kasan_check_write+0x14/0x20 [ 950.277194][T16090] ? __mutex_unlock_slowpath+0x195/0x870 [ 950.282818][T16090] _do_fork+0x1a9/0x1170 [ 950.287049][T16090] ? fork_idle+0x1d0/0x1d0 [ 950.291445][T16090] ? __sb_end_write+0xd9/0x110 [ 950.296209][T16090] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.302426][T16090] ? fput+0x128/0x1a0 [ 950.306384][T16090] ? do_syscall_64+0x8c/0x800 [ 950.311051][T16090] ? do_syscall_64+0x8c/0x800 [ 950.315711][T16090] ? lockdep_hardirqs_on+0x415/0x5d0 [ 950.320975][T16090] ? trace_hardirqs_on+0xbd/0x310 [ 950.325976][T16090] ? __ia32_sys_read+0xb0/0xb0 [ 950.330734][T16090] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.336791][T16090] ? trace_hardirqs_off_caller+0x300/0x300 [ 950.342581][T16090] __x64_sys_clone+0xbf/0x150 [ 950.347247][T16090] do_syscall_64+0x1a3/0x800 [ 950.351817][T16090] ? syscall_return_slowpath+0x5f0/0x5f0 [ 950.357427][T16090] ? prepare_exit_to_usermode+0x232/0x3b0 [ 950.363129][T16090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 950.368664][T16090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.374535][T16090] RIP: 0033:0x457ec9 [ 950.378418][T16090] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.398000][T16090] RSP: 002b:00007f1c64115c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 950.406388][T16090] RAX: ffffffffffffffda RBX: 00007f1c64115c90 RCX: 0000000000457ec9 20:14:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) 20:14:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x2, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:44 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, 0x0) 20:14:44 executing program 1 (fault-call:1 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 950.414351][T16090] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000010000000 [ 950.422311][T16090] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 950.430258][T16090] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c641166d4 [ 950.438206][T16090] R13: 00000000004be2a0 R14: 00000000004ce600 R15: 0000000000000003 [ 950.596024][T16107] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 950.633549][T16110] FAULT_INJECTION: forcing a failure. [ 950.633549][T16110] name failslab, interval 1, probability 0, space 0, times 0 20:14:44 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x01', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 950.724714][T16111] hfs: can't find a HFS filesystem on dev loop3 [ 950.738255][T16110] CPU: 1 PID: 16110 Comm: syz-executor1 Not tainted 5.0.0-rc1-next-20190114 #11 [ 950.747302][T16110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.757367][T16110] Call Trace: [ 950.760675][T16110] dump_stack+0x1db/0x2d0 [ 950.765031][T16110] ? dump_stack_print_info.cold+0x20/0x20 [ 950.770776][T16110] should_fail.cold+0xa/0x14 [ 950.775384][T16110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.781207][T16110] ? ___might_sleep+0x1e7/0x310 [ 950.786069][T16110] ? arch_local_save_flags+0x50/0x50 [ 950.791377][T16110] __should_failslab+0x121/0x190 [ 950.796323][T16110] should_failslab+0x9/0x14 [ 950.800831][T16110] kmem_cache_alloc+0x2be/0x710 [ 950.805694][T16110] ? rcu_read_lock_sched_held+0x110/0x130 [ 950.811419][T16110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.817669][T16110] prepare_creds+0xa4/0x510 [ 950.822187][T16110] ? abort_creds+0x2c0/0x2c0 [ 950.826785][T16110] ? copy_process+0xb3c/0x8740 [ 950.832078][T16110] ? trace_hardirqs_off_caller+0x300/0x300 [ 950.837891][T16110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.844140][T16110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 950.850397][T16110] ? check_preemption_disabled+0x48/0x290 [ 950.856157][T16110] copy_creds+0x7b/0x6c0 [ 950.860506][T16110] copy_process+0x114d/0x8740 [ 950.865209][T16110] ? print_usage_bug+0xd0/0xd0 [ 950.869978][T16110] ? __lock_acquire+0x572/0x4a10 20:14:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xc0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 950.874925][T16110] ? process_measurement+0x268/0x1be0 [ 950.880485][T16110] ? print_usage_bug+0xd0/0xd0 [ 950.885262][T16110] ? __lock_acquire+0x572/0x4a10 [ 950.890210][T16110] ? __lock_acquire+0x572/0x4a10 [ 950.895697][T16110] ? __cleanup_sighand+0x70/0x70 [ 950.900654][T16110] ? mark_held_locks+0x100/0x100 [ 950.905618][T16110] ? __lock_acquire+0x572/0x4a10 [ 950.910580][T16110] ? mark_held_locks+0x100/0x100 [ 950.915543][T16110] ? __might_fault+0x12b/0x1e0 20:14:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 950.920322][T16110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.926574][T16110] ? _parse_integer+0x139/0x190 [ 950.931444][T16110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.937702][T16110] ? _kstrtoull+0x17d/0x250 [ 950.942219][T16110] ? add_lock_to_list.isra.0+0x450/0x450 [ 950.947841][T16110] ? lock_downgrade+0xbe0/0xbe0 [ 950.952678][T16110] ? add_lock_to_list.isra.0+0x450/0x450 [ 950.958294][T16110] ? __check_object_size+0xa3/0x790 [ 950.963475][T16110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.969701][T16110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.975939][T16110] ? check_preemption_disabled+0x48/0x290 [ 950.981664][T16110] ? get_pid_task+0xd4/0x190 [ 950.986239][T16110] ? find_held_lock+0x35/0x120 [ 950.990984][T16110] ? get_pid_task+0xd4/0x190 [ 950.995574][T16110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.001804][T16110] ? add_lock_to_list.isra.0+0x450/0x450 [ 951.007435][T16110] ? kasan_check_read+0x11/0x20 [ 951.012270][T16110] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 951.018231][T16110] ? rcu_read_unlock_special+0x380/0x380 [ 951.024168][T16110] ? __f_unlock_pos+0x19/0x20 [ 951.028855][T16110] ? find_held_lock+0x35/0x120 [ 951.033617][T16110] ? __f_unlock_pos+0x19/0x20 [ 951.038284][T16110] ? proc_fail_nth_write+0xa0/0x220 [ 951.043568][T16110] ? lock_downgrade+0xbe0/0xbe0 [ 951.048406][T16110] ? vfs_write+0x2f0/0x580 [ 951.053185][T16110] ? kasan_check_write+0x14/0x20 [ 951.058112][T16110] ? __mutex_unlock_slowpath+0x195/0x870 [ 951.063742][T16110] _do_fork+0x1a9/0x1170 [ 951.067969][T16110] ? fork_idle+0x1d0/0x1d0 [ 951.072384][T16110] ? __sb_end_write+0xd9/0x110 [ 951.077146][T16110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 951.083371][T16110] ? fput+0x128/0x1a0 [ 951.087343][T16110] ? do_syscall_64+0x8c/0x800 [ 951.092010][T16110] ? do_syscall_64+0x8c/0x800 [ 951.096680][T16110] ? lockdep_hardirqs_on+0x415/0x5d0 [ 951.101962][T16110] ? trace_hardirqs_on+0xbd/0x310 [ 951.114081][T16110] ? __ia32_sys_read+0xb0/0xb0 [ 951.118834][T16110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.124891][T16110] ? trace_hardirqs_off_caller+0x300/0x300 [ 951.130694][T16110] __x64_sys_clone+0xbf/0x150 [ 951.135356][T16110] do_syscall_64+0x1a3/0x800 [ 951.140155][T16110] ? syscall_return_slowpath+0x5f0/0x5f0 [ 951.145787][T16110] ? prepare_exit_to_usermode+0x232/0x3b0 [ 951.151491][T16110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 951.157034][T16110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.162921][T16110] RIP: 0033:0x457ec9 [ 951.166817][T16110] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.186410][T16110] RSP: 002b:00007f1c64115c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 951.194805][T16110] RAX: ffffffffffffffda RBX: 00007f1c64115c90 RCX: 0000000000457ec9 [ 951.202760][T16110] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000010000000 [ 951.210713][T16110] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 951.218680][T16110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c641166d4 20:14:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) [ 951.226642][T16110] R13: 00000000004be2a0 R14: 00000000004ce600 R15: 0000000000000003 20:14:45 executing program 3: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) 20:14:45 executing program 1 (fault-call:1 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 951.328546][T16129] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:14:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 951.452138][T16141] FAULT_INJECTION: forcing a failure. [ 951.452138][T16141] name failslab, interval 1, probability 0, space 0, times 0 [ 951.492067][T16140] hfs: can't find a HFS filesystem on dev loop3 [ 951.501255][T16141] CPU: 0 PID: 16141 Comm: syz-executor1 Not tainted 5.0.0-rc1-next-20190114 #11 [ 951.510302][T16141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.520390][T16141] Call Trace: [ 951.523698][T16141] dump_stack+0x1db/0x2d0 [ 951.528047][T16141] ? dump_stack_print_info.cold+0x20/0x20 [ 951.533777][T16141] ? prepare_creds+0xa4/0x510 [ 951.538463][T16141] ? copy_creds+0x7b/0x6c0 [ 951.542891][T16141] ? copy_process+0x114d/0x8740 [ 951.547753][T16141] ? _do_fork+0x1a9/0x1170 20:14:45 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00084002998681ff130200001204100000030100000206000001000084811f4ce10000001e001e00000000000010ec0302008100526549734572324673", 0x3d, 0x10000}], 0x0, 0x0) [ 951.551541][T16146] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 951.552171][T16141] ? __x64_sys_clone+0xbf/0x150 [ 951.552191][T16141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.552212][T16141] should_fail.cold+0xa/0x14 [ 951.552232][T16141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.552256][T16141] ? ___might_sleep+0x1e7/0x310 [ 951.552272][T16141] ? arch_local_save_flags+0x50/0x50 [ 951.552289][T16141] ? check_preemption_disabled+0x48/0x290 20:14:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x19, 0x2, 0x238, [0x20000180, 0x0, 0x0, 0x20000280, 0x200003c0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'veth0_to_team\x00', @broadcast, [0x0, 0x0, 0x0, 0x0, 0x2, 0x2], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x20003, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2b0) [ 951.552312][T16141] __should_failslab+0x121/0x190 [ 951.603142][T16141] should_failslab+0x9/0x14 [ 951.607655][T16141] __kmalloc+0x2dc/0x740 [ 951.611901][T16141] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 951.617709][T16141] ? prepare_creds+0xa4/0x510 [ 951.622392][T16141] ? prepare_creds+0xa4/0x510 [ 951.627076][T16141] ? security_prepare_creds+0x123/0x190 [ 951.632633][T16141] security_prepare_creds+0x123/0x190 [ 951.638017][T16141] prepare_creds+0x3c4/0x510 [ 951.642622][T16141] ? abort_creds+0x2c0/0x2c0 [ 951.647237][T16141] ? copy_process+0xb3c/0x8740 [ 951.652034][T16141] ? trace_hardirqs_off_caller+0x300/0x300 [ 951.657858][T16141] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.664112][T16141] ? check_preemption_disabled+0x48/0x290 [ 951.669875][T16141] copy_creds+0x7b/0x6c0 [ 951.674192][T16141] copy_process+0x114d/0x8740 [ 951.678880][T16141] ? print_usage_bug+0xd0/0xd0 [ 951.683667][T16141] ? __lock_acquire+0x572/0x4a10 [ 951.688610][T16141] ? process_measurement+0x268/0x1be0 [ 951.693986][T16141] ? print_usage_bug+0xd0/0xd0 [ 951.698741][T16141] ? __lock_acquire+0x572/0x4a10 [ 951.703664][T16141] ? __lock_acquire+0x572/0x4a10 [ 951.708605][T16141] ? __cleanup_sighand+0x70/0x70 [ 951.713533][T16141] ? mark_held_locks+0x100/0x100 [ 951.718464][T16141] ? __lock_acquire+0x572/0x4a10 [ 951.723398][T16141] ? mark_held_locks+0x100/0x100 [ 951.728325][T16141] ? __might_fault+0x12b/0x1e0 [ 951.733072][T16141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.739299][T16141] ? _parse_integer+0x139/0x190 [ 951.744141][T16141] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 951.750366][T16141] ? _kstrtoull+0x17d/0x250 [ 951.754859][T16141] ? add_lock_to_list.isra.0+0x450/0x450 [ 951.760472][T16141] ? lock_downgrade+0xbe0/0xbe0 [ 951.765330][T16141] ? add_lock_to_list.isra.0+0x450/0x450 [ 951.770946][T16141] ? __check_object_size+0xa3/0x790 [ 951.776126][T16141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.782363][T16141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.788591][T16141] ? check_preemption_disabled+0x48/0x290 [ 951.794304][T16141] ? get_pid_task+0xd4/0x190 [ 951.799399][T16141] ? find_held_lock+0x35/0x120 [ 951.804147][T16141] ? get_pid_task+0xd4/0x190 [ 951.808722][T16141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.814951][T16141] ? add_lock_to_list.isra.0+0x450/0x450 [ 951.820566][T16141] ? kasan_check_read+0x11/0x20 [ 951.825407][T16141] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 951.831371][T16141] ? rcu_read_unlock_special+0x380/0x380 [ 951.836987][T16141] ? __f_unlock_pos+0x19/0x20 [ 951.841653][T16141] ? find_held_lock+0x35/0x120 [ 951.846404][T16141] ? __f_unlock_pos+0x19/0x20 [ 951.851073][T16141] ? proc_fail_nth_write+0xa0/0x220 [ 951.856257][T16141] ? lock_downgrade+0xbe0/0xbe0 [ 951.861098][T16141] ? vfs_write+0x2f0/0x580 [ 951.865510][T16141] ? kasan_check_write+0x14/0x20 [ 951.870439][T16141] ? __mutex_unlock_slowpath+0x195/0x870 [ 951.876057][T16141] _do_fork+0x1a9/0x1170 [ 951.880292][T16141] ? fork_idle+0x1d0/0x1d0 [ 951.884706][T16141] ? __sb_end_write+0xd9/0x110 [ 951.889458][T16141] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 951.895679][T16141] ? fput+0x128/0x1a0 [ 951.899648][T16141] ? do_syscall_64+0x8c/0x800 [ 951.904309][T16141] ? do_syscall_64+0x8c/0x800 [ 951.908970][T16141] ? lockdep_hardirqs_on+0x415/0x5d0 [ 951.914253][T16141] ? trace_hardirqs_on+0xbd/0x310 [ 951.919263][T16141] ? __ia32_sys_read+0xb0/0xb0 [ 951.924011][T16141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.930059][T16141] ? trace_hardirqs_off_caller+0x300/0x300 [ 951.935870][T16141] __x64_sys_clone+0xbf/0x150 [ 951.940541][T16141] do_syscall_64+0x1a3/0x800 [ 951.945122][T16141] ? syscall_return_slowpath+0x5f0/0x5f0 [ 951.950745][T16141] ? prepare_exit_to_usermode+0x232/0x3b0 [ 951.956452][T16141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 951.961988][T16141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.967859][T16141] RIP: 0033:0x457ec9 [ 951.971752][T16141] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.991338][T16141] RSP: 002b:00007f1c64115c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 20:14:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0xd0, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x10, 0x0, @multicast2}, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 20:14:46 executing program 1 (fault-call:1 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 951.999745][T16141] RAX: ffffffffffffffda RBX: 00007f1c64115c90 RCX: 0000000000457ec9 [ 952.007703][T16141] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000010000000 [ 952.015658][T16141] RBP: 000000000073bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 952.023623][T16141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c641166d4 [ 952.031582][T16141] R13: 00000000004be2a0 R14: 00000000004ce600 R15: 0000000000000003 [ 952.085421][ C0] ------------[ cut here ]------------ [ 952.091307][ C0] AppArmor WARN cred_label: ((!blob)): [ 952.091588][ C0] WARNING: CPU: 0 PID: 9 at security/apparmor/include/cred.h:30 apparmor_cred_free+0x12f/0x1a0 [ 952.107448][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 952.114031][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.0.0-rc1-next-20190114 #11 [ 952.122521][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.132586][ C0] Call Trace: [ 952.135863][ C0] dump_stack+0x1db/0x2d0 [ 952.140178][ C0] ? dump_stack_print_info.cold+0x20/0x20 [ 952.145884][ C0] ? apparmor_cred_free+0xc0/0x1a0 [ 952.150978][ C0] panic+0x2cb/0x65c [ 952.154855][ C0] ? add_taint.cold+0x16/0x16 [ 952.159543][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 952.164741][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.170976][ C0] ? __probe_kernel_read+0x1f4/0x250 [ 952.176259][ C0] ? __warn.cold+0x5/0x48 [ 952.180574][ C0] ? __warn+0xe8/0x1d0 [ 952.184632][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 952.189822][ C0] __warn.cold+0x20/0x48 [ 952.194045][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 952.199228][ C0] report_bug+0x263/0x2b0 [ 952.203619][ C0] do_error_trap+0x11b/0x200 [ 952.208194][ C0] do_invalid_op+0x37/0x50 [ 952.212613][ C0] ? apparmor_cred_free+0x12f/0x1a0 [ 952.217793][ C0] invalid_op+0x14/0x20 [ 952.221928][ C0] RIP: 0010:apparmor_cred_free+0x12f/0x1a0 [ 952.227712][ C0] Code: 7c 88 48 c7 c7 c0 d1 7c 88 e8 ed 6f f2 fd 0f 0b eb a9 e8 14 46 29 fe 48 c7 c6 80 e1 7c 88 48 c7 c7 c0 d1 7c 88 e8 d1 6f f2 fd <0f> 0b 48 b8 00 00 00 00 00 fc ff df 80 38 00 75 4a 4c 8b 2c 25 00 [ 952.247301][ C0] RSP: 0000:ffff8880a9487970 EFLAGS: 00010286 [ 952.253352][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 952.261306][ C0] RDX: 0000000000000100 RSI: ffffffff81688726 RDI: 0000000000000006 [ 952.269275][ C0] RBP: ffff8880a9487990 R08: ffff8880a9478240 R09: 0000000000000000 [ 952.277250][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88808677c700 [ 952.285206][ C0] R13: ffff88808677c700 R14: ffff88808677c788 R15: dffffc0000000000 [ 952.293353][ C0] ? vprintk_func+0x86/0x189 [ 952.297934][ C0] security_cred_free+0x4b/0xf0 [ 952.302784][ C0] put_cred_rcu+0x21f/0x6e0 [ 952.307271][ C0] ? get_task_cred+0x5e0/0x5e0 [ 952.312026][ C0] ? lock_release+0xc40/0xc40 [ 952.316720][ C0] ? kmem_freepages.isra.0+0x436/0x660 [ 952.322185][ C0] rcu_core+0xc4a/0x1680 [ 952.326422][ C0] ? do_raw_spin_trylock+0x270/0x270 [ 952.331698][ C0] ? rcu_fwd_progress_check+0xd0/0xd0 [ 952.337055][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.343309][ C0] ? check_preemption_disabled+0x48/0x290 [ 952.349019][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.355243][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.361467][ C0] ? check_preemption_disabled+0x48/0x290 [ 952.367172][ C0] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 952.373393][ C0] ? rcu_pm_notify+0xd0/0xd0 [ 952.377972][ C0] __do_softirq+0x30b/0xb11 [ 952.382462][ C0] ? __irqentry_text_end+0x1f96d2/0x1f96d2 [ 952.388254][ C0] ? smpboot_thread_fn+0x6ab/0xa10 [ 952.393346][ C0] ? trace_hardirqs_on_caller+0x310/0x310 [ 952.399045][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 952.405270][ C0] ? check_preemption_disabled+0x48/0x290 [ 952.410967][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.417196][ C0] ? takeover_tasklets+0xa70/0xa70 [ 952.422289][ C0] run_ksoftirqd+0x8e/0x110 [ 952.426772][ C0] smpboot_thread_fn+0x6ab/0xa10 [ 952.431700][ C0] ? sort_range+0x30/0x30 [ 952.436020][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 952.442242][ C0] ? __kthread_parkme+0xfb/0x1b0 [ 952.447161][ C0] kthread+0x357/0x430 [ 952.451219][ C0] ? sort_range+0x30/0x30 [ 952.455558][ C0] ? kthread_stop+0x920/0x920 [ 952.460236][ C0] ret_from_fork+0x3a/0x50 [ 952.466023][ C0] Kernel Offset: disabled [ 952.470501][ C0] Rebooting in 86400 seconds..