200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x6800000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x6c00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1316.741636][T25958] x_tables: duplicate underflow at hook 2 [ 1316.775552][T25962] x_tables: duplicate underflow at hook 2 19:17:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x7400000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1316.853439][T25965] x_tables: duplicate underflow at hook 2 [ 1316.963976][T25968] x_tables: duplicate underflow at hook 2 19:17:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:16 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x7a00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1317.049393][T25972] x_tables: duplicate underflow at hook 2 19:17:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x9d45000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[], 0xfff, 0x0, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff]}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0xffffffff00000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1317.495452][T25978] x_tables: duplicate underflow at hook 2 [ 1317.568903][T25982] x_tables: duplicate underflow at hook 2 19:17:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0xff, 0x61b430263da3e261, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x2}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1317.665427][T25984] x_tables: duplicate underflow at hook 2 19:17:16 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x3}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x5}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[], 0xfff}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff]}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x8}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0xff, 0x61b430263da3e261], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x9}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xa}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xb}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xc}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xd}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xe}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[], 0xfff}}, @common=@ah={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff]}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x10}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x11}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x12}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x25}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x48}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x0, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4c}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x60}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x68}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[], 0xfff}}, @common=@ah={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff]}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6c}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x74}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7a}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x130}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x0, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x300}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x360}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x500}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x600}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1321.563956][T26090] xt_check_table_hooks: 27 callbacks suppressed [ 1321.563971][T26090] x_tables: duplicate underflow at hook 2 19:17:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x700}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x900}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1321.765708][T26095] x_tables: duplicate underflow at hook 2 19:17:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xa00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1321.847127][T26101] x_tables: duplicate underflow at hook 2 [ 1321.906460][T26104] x_tables: duplicate underflow at hook 2 19:17:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x0, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xb00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xc00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1322.276076][T26107] x_tables: duplicate underflow at hook 2 19:17:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xd00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1322.327121][T26112] x_tables: duplicate underflow at hook 2 19:17:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xe00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1322.383089][T26116] x_tables: duplicate underflow at hook 2 [ 1322.441760][T26118] x_tables: duplicate underflow at hook 2 19:17:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x1100}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], [], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) [ 1322.774487][T26123] x_tables: duplicate underflow at hook 2 19:17:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x1200}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x0, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x2500}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1323.334192][T26136] x_tables: duplicate underflow at hook 2 19:17:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x3001}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x459d}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4800}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4c00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6003}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x0, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6800}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6c00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7400}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7a00}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x9d45}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x20000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1325.209224][T26182] warn_alloc: 46 callbacks suppressed [ 1325.209299][T26182] syz-executor.1: vmalloc error: size 312475648, page order 9, failed to allocate pages, mode:0x400cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 1325.232664][T26182] CPU: 1 PID: 26182 Comm: syz-executor.1 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1325.242740][T26182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1325.252797][T26182] Call Trace: [ 1325.256209][T26182] [ 1325.259146][T26182] dump_stack_lvl+0xda/0x130 [ 1325.263744][T26182] dump_stack+0x15/0x20 [ 1325.267949][T26182] warn_alloc+0x140/0x1b0 [ 1325.272348][T26182] ? __mod_memcg_state+0x42/0xc0 [ 1325.277375][T26182] ? __rcu_read_unlock+0x4d/0x70 [ 1325.282487][T26182] __vmalloc_node_range+0xc7c/0xeb0 [ 1325.287702][T26182] kvmalloc_node+0x121/0x160 [ 1325.292302][T26182] ? xt_alloc_table_info+0x3d/0x80 [ 1325.297437][T26182] xt_alloc_table_info+0x3d/0x80 [ 1325.302448][T26182] do_ip6t_set_ctl+0x614/0x17d0 [ 1325.307399][T26182] ? finish_task_switch+0xac/0x280 [ 1325.312521][T26182] ? __schedule+0x633/0x8b0 [ 1325.317073][T26182] ? futex_unqueue+0xba/0xe0 [ 1325.321832][T26182] ? futex_wait+0x3c3/0x410 [ 1325.326386][T26182] ? __rcu_read_unlock+0x4d/0x70 [ 1325.331372][T26182] nf_setsockopt+0x18d/0x1b0 [ 1325.336080][T26182] ipv6_setsockopt+0x11c/0x130 [ 1325.341068][T26182] rawv6_setsockopt+0x21e/0x410 [ 1325.345914][T26182] sock_common_setsockopt+0x61/0x70 [ 1325.351125][T26182] ? sock_common_recvmsg+0xe0/0xe0 [ 1325.356252][T26182] __sys_setsockopt+0x1c3/0x230 [ 1325.361091][T26182] __x64_sys_setsockopt+0x66/0x80 [ 1325.366206][T26182] do_syscall_64+0x41/0xc0 [ 1325.370615][T26182] ? syscall_exit_to_user_mode+0x26/0x140 [ 1325.376334][T26182] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1325.382299][T26182] RIP: 0033:0x7fdf27376169 [ 1325.386876][T26182] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1325.406529][T26182] RSP: 002b:00007fdf266e9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1325.414941][T26182] RAX: ffffffffffffffda RBX: 00007fdf27495f80 RCX: 00007fdf27376169 [ 1325.422979][T26182] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1325.431030][T26182] RBP: 00007fdf273d1ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1325.438996][T26182] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1325.447040][T26182] R13: 00007ffc813f134f R14: 00007fdf266e9300 R15: 0000000000022000 [ 1325.455173][T26182] [ 1325.458320][T26182] Mem-Info: [ 1325.461470][T26182] active_anon:1772 inactive_anon:16906 isolated_anon:0 [ 1325.461470][T26182] active_file:3935 inactive_file:8835 isolated_file:0 [ 1325.461470][T26182] unevictable:0 dirty:0 writeback:0 [ 1325.461470][T26182] slab_reclaimable:6915 slab_unreclaimable:17011 [ 1325.461470][T26182] mapped:19673 shmem:2858 pagetables:541 [ 1325.461470][T26182] sec_pagetables:0 bounce:0 [ 1325.461470][T26182] kernel_misc_reclaimable:0 [ 1325.461470][T26182] free:1700528 free_pcp:1297 free_cma:0 [ 1325.506408][T26182] Node 0 active_anon:7088kB inactive_anon:67508kB active_file:15740kB inactive_file:35340kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:78692kB dirty:0kB writeback:0kB shmem:11432kB writeback_tmp:0kB kernel_stack:3232kB pagetables:2164kB sec_pagetables:0kB all_unreclaimable? no [ 1325.534370][T26182] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1325.561318][T26182] lowmem_reserve[]: 0 2896 7874 7874 [ 1325.566656][T26182] Node 0 DMA32 free:2965464kB boost:0kB min:4172kB low:7136kB high:10100kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2969140kB mlocked:0kB bounce:0kB free_pcp:3676kB local_pcp:1964kB free_cma:0kB [ 1325.595293][T26182] lowmem_reserve[]: 0 0 4978 4978 19:17:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x1000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1325.600379][T26182] Node 0 Normal free:4089828kB boost:0kB min:7172kB low:12268kB high:17364kB reserved_highatomic:0KB active_anon:7088kB inactive_anon:67392kB active_file:15740kB inactive_file:35340kB unevictable:0kB writepending:0kB present:5242880kB managed:5098224kB mlocked:0kB bounce:0kB free_pcp:684kB local_pcp:432kB free_cma:0kB [ 1325.630729][T26182] lowmem_reserve[]: 0 0 0 0 [ 1325.635377][T26182] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB 19:17:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x0, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1325.648460][T26182] Node 0 DMA32: 2*4kB (M) 0*8kB 1*16kB (M) 2*32kB (M) 2*64kB (M) 2*128kB (M) 2*256kB (M) 2*512kB (M) 2*1024kB (M) 2*2048kB (M) 722*4096kB (M) = 2965464kB [ 1325.664149][T26182] Node 0 Normal: 3183*4kB (UME) 1304*8kB (UME) 692*16kB (UME) 423*32kB (UME) 485*64kB (UME) 276*128kB (UME) 168*256kB (UM) 120*512kB (UME) 101*1024kB (UME) 79*2048kB (U) 907*4096kB (UM) = 4198876kB [ 1325.683849][T26182] Node 0 hugepages_total=8 hugepages_free=8 hugepages_surp=4 hugepages_size=2048kB [ 1325.693164][T26182] 15629 total pagecache pages [ 1325.697899][T26182] 0 pages in swap cache [ 1325.702075][T26182] Free swap = 0kB [ 1325.705821][T26182] Total swap = 0kB 19:17:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x2000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1325.709543][T26182] 2097051 pages RAM [ 1325.713408][T26182] 0 pages HighMem/MovableOnly [ 1325.718088][T26182] 76370 pages reserved 19:17:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x3000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x5000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1326.557606][T26195] syz-executor.0 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1326.571546][T26195] CPU: 1 PID: 26195 Comm: syz-executor.0 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1326.581656][T26195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1326.591806][T26195] Call Trace: [ 1326.595248][T26195] [ 1326.598176][T26195] dump_stack_lvl+0xda/0x130 [ 1326.602860][T26195] dump_stack+0x15/0x20 [ 1326.607025][T26195] dump_header+0x95/0x3c0 [ 1326.611355][T26195] oom_kill_process+0xe3/0x3e0 [ 1326.616115][T26195] out_of_memory+0x9f0/0xc30 [ 1326.620700][T26195] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1326.626980][T26195] mem_cgroup_out_of_memory+0x139/0x190 [ 1326.632666][T26195] try_charge_memcg+0x759/0xd20 [ 1326.637715][T26195] obj_cgroup_charge_pages+0xab/0x130 [ 1326.643151][T26195] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1326.648688][T26195] __alloc_pages+0x1bb/0x340 [ 1326.653276][T26195] alloc_pages+0x3e1/0x4e0 [ 1326.657684][T26195] __vmalloc_node_range+0x6d2/0xeb0 [ 1326.662880][T26195] kvmalloc_node+0x121/0x160 [ 1326.667529][T26195] ? xt_alloc_table_info+0x3d/0x80 [ 1326.672739][T26195] xt_alloc_table_info+0x3d/0x80 [ 1326.677884][T26195] do_ip6t_set_ctl+0x614/0x17d0 [ 1326.682908][T26195] ? finish_task_switch+0xac/0x280 [ 1326.688098][T26195] ? __schedule+0x633/0x8b0 [ 1326.692588][T26195] ? futex_unqueue+0xba/0xe0 [ 1326.697232][T26195] ? futex_wait+0x3c3/0x410 [ 1326.701760][T26195] ? __rcu_read_unlock+0x4d/0x70 [ 1326.706750][T26195] nf_setsockopt+0x18d/0x1b0 [ 1326.711601][T26195] ipv6_setsockopt+0x11c/0x130 [ 1326.716527][T26195] rawv6_setsockopt+0x21e/0x410 [ 1326.721445][T26195] sock_common_setsockopt+0x61/0x70 [ 1326.726643][T26195] ? sock_common_recvmsg+0xe0/0xe0 [ 1326.731915][T26195] __sys_setsockopt+0x1c3/0x230 [ 1326.736755][T26195] __x64_sys_setsockopt+0x66/0x80 [ 1326.741803][T26195] do_syscall_64+0x41/0xc0 [ 1326.746295][T26195] ? syscall_exit_to_user_mode+0x26/0x140 [ 1326.752010][T26195] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1326.758007][T26195] RIP: 0033:0x7f9aace90169 [ 1326.762490][T26195] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1326.782116][T26195] RSP: 002b:00007f9aac203168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1326.790528][T26195] RAX: ffffffffffffffda RBX: 00007f9aacfaff80 RCX: 00007f9aace90169 [ 1326.798549][T26195] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1326.806538][T26195] RBP: 00007f9aaceebca1 R08: 0000000000000490 R09: 0000000000000000 [ 1326.814514][T26195] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1326.822559][T26195] R13: 00007ffdf2c8fd3f R14: 00007f9aac203300 R15: 0000000000022000 [ 1326.831519][T26195] [ 1326.834619][T26195] memory: usage 307200kB, limit 307200kB, failcnt 3821 [ 1326.841557][T26195] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1326.848447][T26195] Memory cgroup stats for /syz0: [ 1326.907022][T26195] anon 135168 [ 1326.907022][T26195] file 36864 [ 1326.907022][T26195] kernel 314384384 [ 1326.907022][T26195] kernel_stack 32768 [ 1326.907022][T26195] pagetables 77824 [ 1326.907022][T26195] sec_pagetables 0 [ 1326.907022][T26195] percpu 64 [ 1326.907022][T26195] sock 0 [ 1326.907022][T26195] vmalloc 0 [ 1326.907022][T26195] shmem 32768 [ 1326.907022][T26195] file_mapped 28672 [ 1326.907022][T26195] file_dirty 0 [ 1326.907022][T26195] file_writeback 0 [ 1326.907022][T26195] swapcached 0 [ 1326.907022][T26195] inactive_anon 139264 [ 1326.907022][T26195] active_anon 28672 [ 1326.907022][T26195] inactive_file 4096 [ 1326.907022][T26195] active_file 0 [ 1326.907022][T26195] unevictable 0 [ 1326.907022][T26195] slab_reclaimable 88080 [ 1326.907022][T26195] slab_unreclaimable 662408 [ 1326.907022][T26195] slab 750488 [ 1326.907022][T26195] workingset_refault_anon 0 [ 1326.907022][T26195] workingset_refault_file 16 [ 1326.907022][T26195] workingset_activate_anon 0 [ 1326.907022][T26195] workingset_activate_file 0 [ 1326.907022][T26195] workingset_restore_anon 0 [ 1326.907022][T26195] workingset_restore_file 0 [ 1326.907022][T26195] workingset_nodereclaim 0 [ 1326.907022][T26195] pgscan 3316 [ 1326.907022][T26195] pgsteal 161 [ 1326.907022][T26195] pgscan_kswapd 0 [ 1326.907022][T26195] pgscan_direct 3316 [ 1326.907022][T26195] pgscan_khugepaged 0 [ 1326.907022][T26195] pgsteal_kswapd 0 [ 1326.907022][T26195] pgsteal_direct 161 [ 1326.907022][T26195] pgsteal_khugepaged 0 [ 1326.907022][T26195] pgfault 729605 [ 1326.907022][T26195] pgmajfault 0 [ 1326.907022][T26195] pgrefill 3423 [ 1326.907022][T26195] pgactivate 3298 [ 1326.907022][T26195] pgdeactivate 3423 [ 1326.907022][T26195] pglazyfree 0 [ 1326.907022][T26195] pglazyfreed 0 [ 1327.070860][T26195] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=26188,uid=0 [ 1327.086311][T26195] Memory cgroup out of memory: Killed process 26195 (syz-executor.0) total-vm:46484kB, anon-rss:372kB, file-rss:8944kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:17:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x8000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:26 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1327.284220][T26220] xt_check_table_hooks: 20 callbacks suppressed [ 1327.284309][T26220] x_tables: duplicate underflow at hook 2 19:17:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x9000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xa000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1327.402449][T26233] x_tables: duplicate underflow at hook 2 [ 1327.469030][T26235] x_tables: duplicate underflow at hook 2 19:17:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xb000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xc000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1327.544737][T26237] x_tables: duplicate underflow at hook 2 19:17:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xd000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1327.607867][T26239] x_tables: duplicate underflow at hook 2 19:17:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xe000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1327.666944][T26241] x_tables: duplicate underflow at hook 2 [ 1327.707534][T26243] x_tables: duplicate underflow at hook 2 19:17:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0x0, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x10000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x11000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1328.230819][T26247] x_tables: duplicate underflow at hook 2 19:17:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x12000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1328.319726][T26260] x_tables: duplicate underflow at hook 2 19:17:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x25000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1328.372668][T26263] x_tables: duplicate underflow at hook 2 19:17:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x30010000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x48000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4c000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0x0, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x60000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0x0, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x60030000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x68000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6c000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x74000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7a000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x9d450000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0x0, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x2000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x100000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x200000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x300000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x400000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x0, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x500000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x600000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x700000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x800000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x900000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xa00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xb00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:31 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x0, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xc00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xd00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xe00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1332.367102][T26369] xt_check_table_hooks: 24 callbacks suppressed [ 1332.367133][T26369] x_tables: duplicate underflow at hook 2 19:17:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x1000000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1332.419703][T26373] x_tables: duplicate underflow at hook 2 19:17:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x1100000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1332.469510][T26377] x_tables: duplicate underflow at hook 2 19:17:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x1200000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1332.521102][T26379] x_tables: duplicate underflow at hook 2 [ 1332.579775][T26381] x_tables: duplicate underflow at hook 2 19:17:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x2500000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1332.654015][T26383] x_tables: duplicate underflow at hook 2 19:17:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x0, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x3001000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1333.197607][T26387] x_tables: duplicate underflow at hook 2 19:17:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4800000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x4c00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6000000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1333.369339][T26396] x_tables: duplicate underflow at hook 2 [ 1333.401194][T26400] x_tables: duplicate underflow at hook 2 19:17:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6003000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1333.454111][T26405] x_tables: duplicate underflow at hook 2 19:17:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6800000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x6c00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7400000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x7a00000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0x9d45000000000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {0x0, 0xffffffff00000000}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0xa}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x27}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:34 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x2b}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1335.295477][T26443] warn_alloc: 44 callbacks suppressed [ 1335.295492][T26443] syz-executor.3: vmalloc error: size 304087040, page order 9, failed to allocate pages, mode:0x400cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 1335.318947][T26443] CPU: 0 PID: 26443 Comm: syz-executor.3 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1335.329037][T26443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1335.339106][T26443] Call Trace: [ 1335.342462][T26443] [ 1335.345396][T26443] dump_stack_lvl+0xda/0x130 [ 1335.349992][T26443] dump_stack+0x15/0x20 [ 1335.354210][T26443] warn_alloc+0x140/0x1b0 [ 1335.358606][T26443] ? __mod_memcg_state+0x42/0xc0 [ 1335.363711][T26443] ? __rcu_read_unlock+0x4d/0x70 [ 1335.368718][T26443] __vmalloc_node_range+0xc7c/0xeb0 [ 1335.373933][T26443] kvmalloc_node+0x121/0x160 [ 1335.378516][T26443] ? xt_alloc_table_info+0x3d/0x80 [ 1335.383783][T26443] xt_alloc_table_info+0x3d/0x80 [ 1335.388714][T26443] do_ip6t_set_ctl+0x614/0x17d0 [ 1335.393554][T26443] ? update_load_avg+0x1cf/0x6c0 [ 1335.398575][T26443] ? rb_insert_color+0x280/0x290 [ 1335.403549][T26443] ? reweight_entity+0x22/0x120 [ 1335.408414][T26443] ? enqueue_task_fair+0x678/0x820 [ 1335.413756][T26443] ? check_preempt_wakeup+0x187/0x320 [ 1335.419126][T26443] ? ttwu_do_activate+0x8c/0x1c0 [ 1335.424086][T26443] ? __rcu_read_unlock+0x4d/0x70 [ 1335.429118][T26443] nf_setsockopt+0x18d/0x1b0 [ 1335.433701][T26443] ipv6_setsockopt+0x11c/0x130 [ 1335.438465][T26443] rawv6_setsockopt+0x21e/0x410 [ 1335.443321][T26443] sock_common_setsockopt+0x61/0x70 [ 1335.448525][T26443] ? sock_common_recvmsg+0xe0/0xe0 [ 1335.453636][T26443] __sys_setsockopt+0x1c3/0x230 [ 1335.458493][T26443] __x64_sys_setsockopt+0x66/0x80 [ 1335.463510][T26443] do_syscall_64+0x41/0xc0 [ 1335.467936][T26443] ? syscall_exit_to_user_mode+0x26/0x140 [ 1335.473653][T26443] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1335.479574][T26443] RIP: 0033:0x7fed3bade169 [ 1335.483981][T26443] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1335.503607][T26443] RSP: 002b:00007fed3ae51168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1335.512011][T26443] RAX: ffffffffffffffda RBX: 00007fed3bbfdf80 RCX: 00007fed3bade169 [ 1335.519985][T26443] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1335.527946][T26443] RBP: 00007fed3bb39ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1335.535921][T26443] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1335.543887][T26443] R13: 00007ffeb6c50edf R14: 00007fed3ae51300 R15: 0000000000022000 [ 1335.551892][T26443] [ 1335.555017][T26443] Mem-Info: [ 1335.558119][T26443] active_anon:1777 inactive_anon:16844 isolated_anon:0 [ 1335.558119][T26443] active_file:3944 inactive_file:8835 isolated_file:0 [ 1335.558119][T26443] unevictable:0 dirty:0 writeback:0 [ 1335.558119][T26443] slab_reclaimable:6915 slab_unreclaimable:17014 [ 1335.558119][T26443] mapped:19673 shmem:2863 pagetables:512 [ 1335.558119][T26443] sec_pagetables:0 bounce:0 [ 1335.558119][T26443] kernel_misc_reclaimable:0 [ 1335.558119][T26443] free:1812117 free_pcp:2262 free_cma:0 [ 1335.603633][T26443] Node 0 active_anon:7108kB inactive_anon:67264kB active_file:15776kB inactive_file:35340kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:78692kB dirty:0kB writeback:0kB shmem:11452kB writeback_tmp:0kB kernel_stack:3200kB pagetables:2044kB sec_pagetables:0kB all_unreclaimable? no 19:17:34 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x2d}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) [ 1335.631551][T26443] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1335.658370][T26443] lowmem_reserve[]: 0 2896 7874 7874 [ 1335.663765][T26443] Node 0 DMA32 free:2965464kB boost:0kB min:4172kB low:7136kB high:10100kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2969140kB mlocked:0kB bounce:0kB free_pcp:3676kB local_pcp:1712kB free_cma:0kB [ 1335.692508][T26443] lowmem_reserve[]: 0 0 4978 4978 [ 1335.697626][T26443] Node 0 Normal free:4103796kB boost:0kB min:7172kB low:12268kB high:17364kB reserved_highatomic:0KB active_anon:7108kB inactive_anon:67264kB active_file:15776kB inactive_file:35340kB unevictable:0kB writepending:0kB present:5242880kB managed:5098224kB mlocked:0kB bounce:0kB free_pcp:4456kB local_pcp:3348kB free_cma:0kB [ 1335.727764][T26443] lowmem_reserve[]: 0 0 0 0 [ 1335.732438][T26443] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1335.745123][T26443] Node 0 DMA32: 2*4kB (M) 0*8kB 1*16kB (M) 2*32kB (M) 2*64kB (M) 2*128kB (M) 2*256kB (M) 2*512kB (M) 2*1024kB (M) 2*2048kB (M) 722*4096kB (M) = 2965464kB [ 1335.760845][T26443] Node 0 Normal: 3195*4kB (UME) 1385*8kB (UME) 754*16kB (UME) 377*32kB (UME) 446*64kB (UME) 239*128kB (UME) 120*256kB (UM) 90*512kB (UME) 74*1024kB (UME) 0*2048kB 878*4096kB (UM) = 3855988kB [ 1335.779738][T26443] Node 0 hugepages_total=8 hugepages_free=8 hugepages_surp=4 hugepages_size=2048kB [ 1335.789069][T26443] 15642 total pagecache pages 19:17:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x60}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1335.793836][T26443] 0 pages in swap cache [ 1335.798124][T26443] Free swap = 0kB [ 1335.801858][T26443] Total swap = 0kB [ 1335.805600][T26443] 2097051 pages RAM [ 1335.809467][T26443] 0 pages HighMem/MovableOnly [ 1335.814209][T26443] 76370 pages reserved 19:17:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x2}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x3}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x4}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x5}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x6}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) getpid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x7}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x8}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:36 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x9}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0xa}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1337.619532][T26498] xt_check_table_hooks: 16 callbacks suppressed [ 1337.619546][T26498] x_tables: duplicate underflow at hook 2 19:17:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0xb}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1337.684008][T26502] x_tables: duplicate underflow at hook 2 [ 1337.726104][T26505] x_tables: duplicate underflow at hook 2 19:17:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0xc}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) getpid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0xd}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1337.825894][T26511] x_tables: duplicate underflow at hook 2 [ 1337.882876][T26516] x_tables: duplicate underflow at hook 2 19:17:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0xe}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x10}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1337.963856][T26520] x_tables: duplicate underflow at hook 2 19:17:37 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1338.007978][T26522] x_tables: duplicate underflow at hook 2 19:17:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x11}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x12}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1338.565944][T26526] x_tables: duplicate underflow at hook 2 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x25}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1338.617376][T26530] x_tables: duplicate underflow at hook 2 [ 1338.691278][T26533] x_tables: duplicate underflow at hook 2 19:17:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x48}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) getpid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x4c}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x60}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x68}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:38 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:38 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x6c}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x74}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30, 'frag\x00', 0x7a}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x2, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x4, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x5, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x6, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[], 0x0, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x7, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x8, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x9, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0xa, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0xb, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0xc, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0xd, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[], 0x0, 0x0, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0xe, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x10, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x11, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x12, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10002], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10003], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10004], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:41 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:41 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10005], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10006], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1342.640820][T26644] xt_check_table_hooks: 26 callbacks suppressed [ 1342.640836][T26644] x_tables: duplicate underflow at hook 2 19:17:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10007], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10008], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10009], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1342.873572][T26648] x_tables: duplicate underflow at hook 2 [ 1342.908260][T26652] x_tables: duplicate underflow at hook 2 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1000a], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1342.988779][T26658] x_tables: duplicate underflow at hook 2 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1000b], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1343.033130][T26660] x_tables: duplicate underflow at hook 2 [ 1343.090137][T26662] x_tables: duplicate underflow at hook 2 19:17:42 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}}, @common=@ah={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1000c], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1000d], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1343.611443][T26668] x_tables: duplicate underflow at hook 2 [ 1343.677334][T26672] x_tables: duplicate underflow at hook 2 19:17:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1000e], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) [ 1343.829950][T26676] x_tables: duplicate underflow at hook 2 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10010], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10011], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1343.910973][T26683] x_tables: duplicate underflow at hook 2 19:17:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10012], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10025], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10048], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:43 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1004c], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10060], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10068], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1006c], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) 19:17:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10074], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1345.848698][T26728] warn_alloc: 47 callbacks suppressed [ 1345.848713][T26728] syz-executor.3: vmalloc error: size 304087040, page order 9, failed to allocate pages, mode:0x400cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 1345.872100][T26728] CPU: 1 PID: 26728 Comm: syz-executor.3 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1345.882171][T26728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1345.892231][T26728] Call Trace: [ 1345.895579][T26728] [ 1345.898511][T26728] dump_stack_lvl+0xda/0x130 [ 1345.903117][T26728] dump_stack+0x15/0x20 [ 1345.907333][T26728] warn_alloc+0x140/0x1b0 [ 1345.911706][T26728] ? __mod_memcg_state+0x27/0xc0 [ 1345.916777][T26728] ? __rcu_read_unlock+0x4d/0x70 [ 1345.921742][T26728] __vmalloc_node_range+0xc7c/0xeb0 [ 1345.927036][T26728] kvmalloc_node+0x121/0x160 [ 1345.931704][T26728] ? xt_alloc_table_info+0x3d/0x80 [ 1345.936865][T26728] xt_alloc_table_info+0x3d/0x80 [ 1345.941804][T26728] do_ip6t_set_ctl+0x614/0x17d0 [ 1345.946673][T26728] ? finish_task_switch+0xac/0x280 [ 1345.951898][T26728] ? __schedule+0x633/0x8b0 [ 1345.956430][T26728] ? futex_unqueue+0xba/0xe0 [ 1345.961050][T26728] ? futex_wait+0x3c3/0x410 [ 1345.965569][T26728] ? __rcu_read_unlock+0x4d/0x70 [ 1345.970545][T26728] nf_setsockopt+0x18d/0x1b0 [ 1345.976128][T26728] ipv6_setsockopt+0x11c/0x130 [ 1345.981049][T26728] rawv6_setsockopt+0x21e/0x410 [ 1345.985923][T26728] sock_common_setsockopt+0x61/0x70 [ 1345.991164][T26728] ? sock_common_recvmsg+0xe0/0xe0 [ 1345.996289][T26728] __sys_setsockopt+0x1c3/0x230 [ 1346.001301][T26728] __x64_sys_setsockopt+0x66/0x80 [ 1346.006474][T26728] do_syscall_64+0x41/0xc0 [ 1346.010882][T26728] ? syscall_exit_to_user_mode+0x26/0x140 [ 1346.016604][T26728] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1346.022493][T26728] RIP: 0033:0x7fed3bade169 [ 1346.026899][T26728] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1346.046580][T26728] RSP: 002b:00007fed3ae51168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1346.054982][T26728] RAX: ffffffffffffffda RBX: 00007fed3bbfdf80 RCX: 00007fed3bade169 [ 1346.062941][T26728] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1346.070952][T26728] RBP: 00007fed3bb39ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1346.078985][T26728] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1346.086946][T26728] R13: 00007ffeb6c50edf R14: 00007fed3ae51300 R15: 0000000000022000 [ 1346.094951][T26728] [ 1346.098050][T26728] Mem-Info: [ 1346.101160][T26728] active_anon:1779 inactive_anon:16855 isolated_anon:0 [ 1346.101160][T26728] active_file:3952 inactive_file:8834 isolated_file:0 [ 1346.101160][T26728] unevictable:0 dirty:24 writeback:0 [ 1346.101160][T26728] slab_reclaimable:6915 slab_unreclaimable:17011 [ 1346.101160][T26728] mapped:19673 shmem:2865 pagetables:524 [ 1346.101160][T26728] sec_pagetables:0 bounce:0 [ 1346.101160][T26728] kernel_misc_reclaimable:0 [ 1346.101160][T26728] free:1696631 free_pcp:2464 free_cma:0 [ 1346.146198][T26728] Node 0 active_anon:7116kB inactive_anon:67420kB active_file:15808kB inactive_file:35336kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:78692kB dirty:96kB writeback:0kB shmem:11460kB writeback_tmp:0kB kernel_stack:3232kB pagetables:2096kB sec_pagetables:0kB all_unreclaimable? no [ 1346.174267][T26728] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1346.201211][T26728] lowmem_reserve[]: 0 2896 7874 7874 [ 1346.206547][T26728] Node 0 DMA32 free:2965464kB boost:0kB min:4172kB low:7136kB high:10100kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2969140kB mlocked:0kB bounce:0kB free_pcp:3676kB local_pcp:1964kB free_cma:0kB [ 1346.235250][T26728] lowmem_reserve[]: 0 0 4978 4978 19:17:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1007a], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10130], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1346.240453][T26728] Node 0 Normal free:4103936kB boost:0kB min:7172kB low:12268kB high:17364kB reserved_highatomic:0KB active_anon:7116kB inactive_anon:67420kB active_file:15808kB inactive_file:35336kB unevictable:0kB writepending:96kB present:5242880kB managed:5098224kB mlocked:0kB bounce:0kB free_pcp:4848kB local_pcp:516kB free_cma:0kB [ 1346.270791][T26728] lowmem_reserve[]: 0 0 0 0 [ 1346.275338][T26728] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1346.288092][T26728] Node 0 DMA32: 2*4kB (M) 0*8kB 1*16kB (M) 2*32kB (M) 2*64kB (M) 2*128kB (M) 2*256kB (M) 2*512kB (M) 2*1024kB (M) 2*2048kB (M) 722*4096kB (M) = 2965464kB [ 1346.303801][T26728] Node 0 Normal: 3076*4kB (UME) 1476*8kB (UME) 812*16kB (UME) 452*32kB (UME) 510*64kB (UME) 281*128kB (UME) 167*256kB (UM) 125*512kB (UME) 116*1024kB (UME) 22*2048kB (U) 878*4096kB (UM) = 3987056kB [ 1346.323461][T26728] Node 0 hugepages_total=8 hugepages_free=8 hugepages_surp=4 hugepages_size=2048kB [ 1346.332827][T26728] 15652 total pagecache pages [ 1346.337512][T26728] 0 pages in swap cache [ 1346.341668][T26728] Free swap = 0kB [ 1346.345420][T26728] Total swap = 0kB 19:17:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10300], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1346.349231][T26728] 2097051 pages RAM [ 1346.353068][T26728] 0 pages HighMem/MovableOnly [ 1346.357874][T26728] 76370 pages reserved 19:17:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) 19:17:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10360], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10500], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1347.001074][T26739] syz-executor.1 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1347.014711][T26739] CPU: 0 PID: 26739 Comm: syz-executor.1 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1347.024866][T26739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1347.034932][T26739] Call Trace: [ 1347.038198][T26739] [ 1347.041217][T26739] dump_stack_lvl+0xda/0x130 [ 1347.045809][T26739] dump_stack+0x15/0x20 [ 1347.049986][T26739] dump_header+0x95/0x3c0 [ 1347.054406][T26739] oom_kill_process+0xe3/0x3e0 [ 1347.059171][T26739] out_of_memory+0x9f0/0xc30 [ 1347.063785][T26739] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1347.069949][T26739] mem_cgroup_out_of_memory+0x139/0x190 [ 1347.075604][T26739] try_charge_memcg+0x759/0xd20 [ 1347.080447][T26739] obj_cgroup_charge_pages+0xab/0x130 [ 1347.085806][T26739] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1347.091342][T26739] __alloc_pages+0x1bb/0x340 [ 1347.095940][T26739] alloc_pages+0x3e1/0x4e0 [ 1347.100476][T26739] __vmalloc_node_range+0x6d2/0xeb0 [ 1347.105687][T26739] kvmalloc_node+0x121/0x160 [ 1347.110348][T26739] ? xt_alloc_table_info+0x3d/0x80 [ 1347.115464][T26739] xt_alloc_table_info+0x3d/0x80 [ 1347.120541][T26739] do_ip6t_set_ctl+0x614/0x17d0 [ 1347.125454][T26739] ? update_load_avg+0x1cf/0x6c0 [ 1347.130405][T26739] ? rb_insert_color+0x280/0x290 [ 1347.135353][T26739] ? reweight_entity+0x22/0x120 [ 1347.140211][T26739] ? enqueue_task_fair+0x678/0x820 [ 1347.145340][T26739] ? check_preempt_wakeup+0x187/0x320 [ 1347.150725][T26739] ? ttwu_do_activate+0x8c/0x1c0 [ 1347.155792][T26739] ? __rcu_read_unlock+0x4d/0x70 [ 1347.160821][T26739] nf_setsockopt+0x18d/0x1b0 [ 1347.165567][T26739] ipv6_setsockopt+0x11c/0x130 [ 1347.170324][T26739] rawv6_setsockopt+0x21e/0x410 [ 1347.175218][T26739] sock_common_setsockopt+0x61/0x70 [ 1347.180529][T26739] ? sock_common_recvmsg+0xe0/0xe0 [ 1347.185635][T26739] __sys_setsockopt+0x1c3/0x230 [ 1347.190543][T26739] __x64_sys_setsockopt+0x66/0x80 [ 1347.195563][T26739] do_syscall_64+0x41/0xc0 [ 1347.199980][T26739] ? syscall_exit_to_user_mode+0x26/0x140 [ 1347.205846][T26739] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1347.211917][T26739] RIP: 0033:0x7fdf27376169 [ 1347.216318][T26739] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1347.235913][T26739] RSP: 002b:00007fdf266e9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1347.244510][T26739] RAX: ffffffffffffffda RBX: 00007fdf27495f80 RCX: 00007fdf27376169 [ 1347.252558][T26739] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1347.260530][T26739] RBP: 00007fdf273d1ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1347.268510][T26739] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1347.276471][T26739] R13: 00007ffc813f134f R14: 00007fdf266e9300 R15: 0000000000022000 [ 1347.284444][T26739] [ 1347.287596][T26739] memory: usage 307200kB, limit 307200kB, failcnt 2738 [ 1347.294456][T26739] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1347.301446][T26739] Memory cgroup stats for /syz1: [ 1347.374315][T26739] anon 135168 [ 1347.374315][T26739] file 28672 [ 1347.374315][T26739] kernel 314372096 [ 1347.374315][T26739] kernel_stack 16384 [ 1347.374315][T26739] pagetables 77824 [ 1347.374315][T26739] sec_pagetables 0 [ 1347.374315][T26739] percpu 64 [ 1347.374315][T26739] sock 0 [ 1347.374315][T26739] vmalloc 0 [ 1347.374315][T26739] shmem 28672 [ 1347.374315][T26739] file_mapped 28672 [ 1347.374315][T26739] file_dirty 0 [ 1347.374315][T26739] file_writeback 0 [ 1347.374315][T26739] swapcached 0 [ 1347.374315][T26739] inactive_anon 135168 [ 1347.374315][T26739] active_anon 28672 [ 1347.374315][T26739] inactive_file 0 [ 1347.374315][T26739] active_file 0 [ 1347.374315][T26739] unevictable 0 [ 1347.374315][T26739] slab_reclaimable 79800 [ 1347.374315][T26739] slab_unreclaimable 586440 [ 1347.374315][T26739] slab 666240 [ 1347.374315][T26739] workingset_refault_anon 0 [ 1347.374315][T26739] workingset_refault_file 35 [ 1347.374315][T26739] workingset_activate_anon 0 [ 1347.374315][T26739] workingset_activate_file 0 [ 1347.374315][T26739] workingset_restore_anon 0 [ 1347.374315][T26739] workingset_restore_file 0 [ 1347.374315][T26739] workingset_nodereclaim 0 [ 1347.374315][T26739] pgscan 1049 [ 1347.374315][T26739] pgsteal 170 [ 1347.374315][T26739] pgscan_kswapd 0 [ 1347.374315][T26739] pgscan_direct 1049 [ 1347.374315][T26739] pgscan_khugepaged 0 [ 1347.374315][T26739] pgsteal_kswapd 0 [ 1347.374315][T26739] pgsteal_direct 170 [ 1347.374315][T26739] pgsteal_khugepaged 0 [ 1347.374315][T26739] pgfault 770184 [ 1347.374315][T26739] pgmajfault 0 [ 1347.374315][T26739] pgrefill 1057 [ 1347.374315][T26739] pgactivate 917 [ 1347.374315][T26739] pgdeactivate 1057 [ 1347.374315][T26739] pglazyfree 0 [ 1347.374315][T26739] pglazyfreed 0 [ 1347.537234][T26739] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=26736,uid=0 [ 1347.552608][T26739] Memory cgroup out of memory: Killed process 26739 (syz-executor.1) total-vm:46484kB, anon-rss:500kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:17:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) 19:17:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10600], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10700], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1347.763848][T26771] xt_check_table_hooks: 14 callbacks suppressed [ 1347.763859][T26771] x_tables: duplicate underflow at hook 2 19:17:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) getpid() 19:17:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10900], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1347.827593][T26782] x_tables: duplicate underflow at hook 2 19:17:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1347.889663][T26788] x_tables: duplicate underflow at hook 2 19:17:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10a00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:47 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10b00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1348.816561][T26797] x_tables: duplicate underflow at hook 2 19:17:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10c00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1348.863615][T26807] x_tables: duplicate underflow at hook 2 [ 1348.914937][T26815] x_tables: duplicate underflow at hook 2 [ 1349.531293][T26799] syz-executor.0 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1349.545002][T26799] CPU: 1 PID: 26799 Comm: syz-executor.0 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1349.555145][T26799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1349.565218][T26799] Call Trace: [ 1349.568501][T26799] [ 1349.571431][T26799] dump_stack_lvl+0xda/0x130 [ 1349.576047][T26799] dump_stack+0x15/0x20 [ 1349.580202][T26799] dump_header+0x95/0x3c0 [ 1349.584627][T26799] oom_kill_process+0xe3/0x3e0 [ 1349.589470][T26799] out_of_memory+0x9f0/0xc30 [ 1349.594067][T26799] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1349.600322][T26799] mem_cgroup_out_of_memory+0x139/0x190 [ 1349.605969][T26799] try_charge_memcg+0x759/0xd20 [ 1349.610833][T26799] obj_cgroup_charge_pages+0xab/0x130 [ 1349.616232][T26799] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1349.621855][T26799] __alloc_pages+0x1bb/0x340 [ 1349.626507][T26799] alloc_pages+0x3e1/0x4e0 [ 1349.631093][T26799] __vmalloc_node_range+0x6d2/0xeb0 [ 1349.636335][T26799] kvmalloc_node+0x121/0x160 [ 1349.640957][T26799] ? xt_alloc_table_info+0x3d/0x80 [ 1349.646203][T26799] xt_alloc_table_info+0x3d/0x80 [ 1349.651260][T26799] do_ip6t_set_ctl+0x614/0x17d0 [ 1349.656109][T26799] ? finish_task_switch+0xac/0x280 [ 1349.661256][T26799] ? __schedule+0x633/0x8b0 [ 1349.665802][T26799] ? futex_unqueue+0xba/0xe0 [ 1349.670397][T26799] ? avc_has_perm_noaudit+0xde/0x210 [ 1349.675690][T26799] ? __rcu_read_unlock+0x4d/0x70 [ 1349.680751][T26799] nf_setsockopt+0x18d/0x1b0 [ 1349.685365][T26799] ipv6_setsockopt+0x11c/0x130 [ 1349.690134][T26799] rawv6_setsockopt+0x21e/0x410 [ 1349.695010][T26799] sock_common_setsockopt+0x61/0x70 [ 1349.700229][T26799] ? sock_common_recvmsg+0xe0/0xe0 [ 1349.705387][T26799] __sys_setsockopt+0x1c3/0x230 [ 1349.710268][T26799] __x64_sys_setsockopt+0x66/0x80 [ 1349.715390][T26799] do_syscall_64+0x41/0xc0 [ 1349.719815][T26799] ? irqentry_exit+0x12/0x40 [ 1349.724494][T26799] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1349.730469][T26799] RIP: 0033:0x7f9aace90169 [ 1349.734881][T26799] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1349.754572][T26799] RSP: 002b:00007f9aac203168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1349.763179][T26799] RAX: ffffffffffffffda RBX: 00007f9aacfaff80 RCX: 00007f9aace90169 [ 1349.771150][T26799] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1349.779157][T26799] RBP: 00007f9aaceebca1 R08: 0000000000000490 R09: 0000000000000000 [ 1349.787258][T26799] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1349.795277][T26799] R13: 00007ffdf2c8fd3f R14: 00007f9aac203300 R15: 0000000000022000 [ 1349.803399][T26799] [ 1349.806531][T26799] memory: usage 307168kB, limit 307200kB, failcnt 4223 [ 1349.813432][T26799] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1349.820327][T26799] Memory cgroup stats for /syz0: [ 1349.924447][T26799] anon 135168 [ 1349.924447][T26799] file 40960 [ 1349.924447][T26799] kernel 314359808 [ 1349.924447][T26799] kernel_stack 16384 [ 1349.924447][T26799] pagetables 77824 [ 1349.924447][T26799] sec_pagetables 0 [ 1349.924447][T26799] percpu 64 [ 1349.924447][T26799] sock 0 [ 1349.924447][T26799] vmalloc 0 [ 1349.924447][T26799] shmem 32768 [ 1349.924447][T26799] file_mapped 28672 [ 1349.924447][T26799] file_dirty 8192 [ 1349.924447][T26799] file_writeback 0 19:17:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1349.924447][T26799] swapcached 0 [ 1349.924447][T26799] inactive_anon 139264 [ 1349.924447][T26799] active_anon 28672 [ 1349.924447][T26799] inactive_file 4096 [ 1349.924447][T26799] active_file 4096 [ 1349.924447][T26799] unevictable 0 [ 1349.924447][T26799] slab_reclaimable 88192 [ 1349.924447][T26799] slab_unreclaimable 657840 [ 1349.924447][T26799] slab 746032 [ 1349.924447][T26799] workingset_refault_anon 0 [ 1349.924447][T26799] workingset_refault_file 19 [ 1349.924447][T26799] workingset_activate_anon 0 [ 1349.924447][T26799] workingset_activate_file 0 [ 1349.924447][T26799] workingset_restore_anon 0 [ 1349.924447][T26799] workingset_restore_file 0 [ 1349.924447][T26799] workingset_nodereclaim 0 [ 1349.924447][T26799] pgscan 3801 [ 1349.924447][T26799] pgsteal 163 [ 1349.924447][T26799] pgscan_kswapd 0 [ 1349.924447][T26799] pgscan_direct 3801 [ 1349.924447][T26799] pgscan_khugepaged 0 [ 1349.924447][T26799] pgsteal_kswapd 0 [ 1349.924447][T26799] pgsteal_direct 163 [ 1349.924447][T26799] pgsteal_khugepaged 0 [ 1349.924447][T26799] pgfault 731023 [ 1349.924447][T26799] pgmajfault 0 [ 1349.924447][T26799] pgrefill 3933 [ 1349.924447][T26799] pgactivate 3806 [ 1349.924447][T26799] pgdeactivate 3933 [ 1349.924447][T26799] pglazyfree 0 [ 1349.924447][T26799] pglazyfreed 0 [ 1350.093241][T26799] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=26798,uid=0 [ 1350.108691][T26799] Memory cgroup out of memory: Killed process 26799 (syz-executor.0) total-vm:46484kB, anon-rss:500kB, file-rss:8944kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:17:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10d00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:49 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:49 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10e00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:49 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1350.308510][T26836] x_tables: duplicate underflow at hook 2 19:17:49 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1350.378754][T26844] x_tables: duplicate underflow at hook 2 [ 1350.789526][T26826] syz-executor.1 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1350.803152][T26826] CPU: 1 PID: 26826 Comm: syz-executor.1 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1350.813344][T26826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1350.823401][T26826] Call Trace: [ 1350.826696][T26826] [ 1350.829617][T26826] dump_stack_lvl+0xda/0x130 [ 1350.834340][T26826] dump_stack+0x15/0x20 [ 1350.838523][T26826] dump_header+0x95/0x3c0 [ 1350.842932][T26826] oom_kill_process+0xe3/0x3e0 [ 1350.847883][T26826] out_of_memory+0x9f0/0xc30 [ 1350.852506][T26826] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1350.859149][T26826] mem_cgroup_out_of_memory+0x139/0x190 [ 1350.864712][T26826] try_charge_memcg+0x759/0xd20 [ 1350.869573][T26826] obj_cgroup_charge_pages+0xab/0x130 [ 1350.874946][T26826] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1350.880562][T26826] __alloc_pages+0x1bb/0x340 [ 1350.885172][T26826] alloc_pages+0x3e1/0x4e0 [ 1350.889860][T26826] __vmalloc_node_range+0x6d2/0xeb0 [ 1350.895210][T26826] kvmalloc_node+0x121/0x160 [ 1350.899806][T26826] ? xt_alloc_table_info+0x3d/0x80 [ 1350.905088][T26826] xt_alloc_table_info+0x3d/0x80 [ 1350.910151][T26826] do_ip6t_set_ctl+0x614/0x17d0 [ 1350.915013][T26826] ? finish_task_switch+0xac/0x280 [ 1350.920141][T26826] ? __schedule+0x633/0x8b0 [ 1350.924660][T26826] ? futex_unqueue+0xba/0xe0 [ 1350.929320][T26826] ? futex_wait+0x3c3/0x410 [ 1350.933841][T26826] ? __rcu_read_unlock+0x4d/0x70 [ 1350.938864][T26826] nf_setsockopt+0x18d/0x1b0 [ 1350.943675][T26826] ipv6_setsockopt+0x11c/0x130 [ 1350.950718][T26826] rawv6_setsockopt+0x21e/0x410 [ 1350.955612][T26826] sock_common_setsockopt+0x61/0x70 [ 1350.960962][T26826] ? sock_common_recvmsg+0xe0/0xe0 [ 1350.966134][T26826] __sys_setsockopt+0x1c3/0x230 [ 1350.971017][T26826] __x64_sys_setsockopt+0x66/0x80 [ 1350.976046][T26826] do_syscall_64+0x41/0xc0 [ 1350.980500][T26826] ? syscall_exit_to_user_mode+0x26/0x140 [ 1350.988334][T26826] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1350.994303][T26826] RIP: 0033:0x7fdf27376169 [ 1350.998783][T26826] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1351.018492][T26826] RSP: 002b:00007fdf266e9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1351.027105][T26826] RAX: ffffffffffffffda RBX: 00007fdf27495f80 RCX: 00007fdf27376169 [ 1351.035200][T26826] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1351.043177][T26826] RBP: 00007fdf273d1ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1351.051156][T26826] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1351.059133][T26826] R13: 00007ffc813f134f R14: 00007fdf266e9300 R15: 0000000000022000 [ 1351.067110][T26826] [ 1351.070251][T26826] memory: usage 307200kB, limit 307200kB, failcnt 2917 [ 1351.077117][T26826] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1351.084049][T26826] Memory cgroup stats for /syz1: [ 1351.114475][T26826] anon 139264 [ 1351.114475][T26826] file 28672 [ 1351.114475][T26826] kernel 314404864 [ 1351.114475][T26826] kernel_stack 65536 [ 1351.114475][T26826] pagetables 77824 [ 1351.114475][T26826] sec_pagetables 0 [ 1351.114475][T26826] percpu 64 [ 1351.114475][T26826] sock 0 [ 1351.114475][T26826] vmalloc 0 [ 1351.114475][T26826] shmem 28672 [ 1351.114475][T26826] file_mapped 28672 [ 1351.114475][T26826] file_dirty 0 [ 1351.114475][T26826] file_writeback 0 [ 1351.114475][T26826] swapcached 0 [ 1351.114475][T26826] inactive_anon 139264 [ 1351.114475][T26826] active_anon 28672 [ 1351.114475][T26826] inactive_file 0 [ 1351.114475][T26826] active_file 0 [ 1351.114475][T26826] unevictable 0 [ 1351.114475][T26826] slab_reclaimable 79800 [ 1351.114475][T26826] slab_unreclaimable 595672 [ 1351.114475][T26826] slab 675472 [ 1351.114475][T26826] workingset_refault_anon 0 [ 1351.114475][T26826] workingset_refault_file 35 [ 1351.114475][T26826] workingset_activate_anon 0 [ 1351.114475][T26826] workingset_activate_file 0 [ 1351.114475][T26826] workingset_restore_anon 0 [ 1351.114475][T26826] workingset_restore_file 0 [ 1351.114475][T26826] workingset_nodereclaim 0 [ 1351.114475][T26826] pgscan 1049 [ 1351.114475][T26826] pgsteal 170 [ 1351.114475][T26826] pgscan_kswapd 0 [ 1351.114475][T26826] pgscan_direct 1049 [ 1351.114475][T26826] pgscan_khugepaged 0 [ 1351.114475][T26826] pgsteal_kswapd 0 [ 1351.114475][T26826] pgsteal_direct 170 [ 1351.114475][T26826] pgsteal_khugepaged 0 [ 1351.114475][T26826] pgfault 770370 [ 1351.114475][T26826] pgmajfault 0 [ 1351.114475][T26826] pgrefill 1057 [ 1351.114475][T26826] pgactivate 917 [ 1351.114475][T26826] pgdeactivate 1057 [ 1351.114475][T26826] pglazyfree 0 [ 1351.114475][T26826] pglazyfreed 0 [ 1351.278701][T26826] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=26822,uid=0 [ 1351.294385][T26826] Memory cgroup out of memory: Killed process 26822 (syz-executor.1) total-vm:46616kB, anon-rss:500kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:17:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:50 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x11100], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x0, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x11200], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:50 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x12500], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1351.574445][T26858] x_tables: duplicate underflow at hook 2 [ 1351.603602][T26865] x_tables: duplicate underflow at hook 2 19:17:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x13001], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:50 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x1459d], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x14800], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x0, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:17:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x14c00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x16000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x16003], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x16800], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:51 executing program 4: socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1352.799462][T26919] xt_check_table_hooks: 7 callbacks suppressed [ 1352.799477][T26919] x_tables: duplicate underflow at hook 2 19:17:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x16c00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x0, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) 19:17:52 executing program 4: socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x0, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:52 executing program 4: socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x17400], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1353.673828][T26925] x_tables: duplicate underflow at hook 2 19:17:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 19:17:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x17a00], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 1353.753247][T26940] x_tables: duplicate underflow at hook 2 19:17:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 1353.801511][T26946] x_tables: duplicate underflow at hook 2 19:17:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x19d45], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 19:17:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) 19:17:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1354.773221][T26957] x_tables: duplicate underflow at hook 2 19:17:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x0, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 19:17:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x3000000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 19:17:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x0, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1354.844155][T26967] x_tables: duplicate underflow at hook 2 19:17:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1354.907816][T26975] x_tables: duplicate underflow at hook 2 19:17:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x2, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, 0x0, 0x0) 19:17:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1355.820183][T26983] x_tables: duplicate underflow at hook 2 19:17:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x0, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x3, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x4, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xff, 0xffffffff, 0xffffff00], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x10, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1355.925876][T26996] x_tables: duplicate underflow at hook 2 [ 1355.958405][T27000] x_tables: duplicate underflow at hook 2 [ 1356.117122][T26989] warn_alloc: 31 callbacks suppressed [ 1356.117177][T26989] syz-executor.1: vmalloc error: size 312475648, page order 9, failed to allocate pages, mode:0x400cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 1356.140908][T26989] CPU: 0 PID: 26989 Comm: syz-executor.1 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1356.151016][T26989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1356.161095][T26989] Call Trace: [ 1356.164391][T26989] [ 1356.167329][T26989] dump_stack_lvl+0xda/0x130 [ 1356.172016][T26989] dump_stack+0x15/0x20 [ 1356.176182][T26989] warn_alloc+0x140/0x1b0 [ 1356.180550][T26989] ? __rcu_read_unlock+0x4d/0x70 [ 1356.185498][T26989] __vmalloc_node_range+0xc7c/0xeb0 [ 1356.190708][T26989] kvmalloc_node+0x121/0x160 [ 1356.195309][T26989] ? xt_alloc_table_info+0x3d/0x80 [ 1356.200432][T26989] xt_alloc_table_info+0x3d/0x80 [ 1356.205653][T26989] do_ip6t_set_ctl+0x614/0x17d0 [ 1356.210581][T26989] ? update_load_avg+0x1cf/0x6c0 [ 1356.215523][T26989] ? rb_insert_color+0x280/0x290 [ 1356.220503][T26989] ? reweight_entity+0x22/0x120 [ 1356.225448][T26989] ? enqueue_task_fair+0x678/0x820 [ 1356.230579][T26989] ? check_preempt_wakeup+0x187/0x320 [ 1356.236003][T26989] ? ttwu_do_activate+0x8c/0x1c0 [ 1356.240992][T26989] ? __rcu_read_unlock+0x4d/0x70 [ 1356.246126][T26989] nf_setsockopt+0x18d/0x1b0 [ 1356.250761][T26989] ipv6_setsockopt+0x11c/0x130 [ 1356.255590][T26989] rawv6_setsockopt+0x21e/0x410 [ 1356.260451][T26989] sock_common_setsockopt+0x61/0x70 [ 1356.265695][T26989] ? sock_common_recvmsg+0xe0/0xe0 [ 1356.271055][T26989] __sys_setsockopt+0x1c3/0x230 [ 1356.276233][T26989] __x64_sys_setsockopt+0x66/0x80 [ 1356.281250][T26989] do_syscall_64+0x41/0xc0 [ 1356.285779][T26989] ? syscall_exit_to_user_mode+0x26/0x140 [ 1356.291553][T26989] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1356.297565][T26989] RIP: 0033:0x7fdf27376169 [ 1356.302102][T26989] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1356.322415][T26989] RSP: 002b:00007fdf266e9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1356.330945][T26989] RAX: ffffffffffffffda RBX: 00007fdf27495f80 RCX: 00007fdf27376169 [ 1356.338996][T26989] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1356.347014][T26989] RBP: 00007fdf273d1ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1356.354974][T26989] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1356.363020][T26989] R13: 00007ffc813f134f R14: 00007fdf266e9300 R15: 0000000000022000 [ 1356.370994][T26989] [ 1356.374224][T26989] Mem-Info: [ 1356.377499][T26989] active_anon:1789 inactive_anon:16857 isolated_anon:0 [ 1356.377499][T26989] active_file:3959 inactive_file:8835 isolated_file:0 [ 1356.377499][T26989] unevictable:0 dirty:31 writeback:0 [ 1356.377499][T26989] slab_reclaimable:6915 slab_unreclaimable:17009 [ 1356.377499][T26989] mapped:19673 shmem:2875 pagetables:524 [ 1356.377499][T26989] sec_pagetables:0 bounce:0 [ 1356.377499][T26989] kernel_misc_reclaimable:0 [ 1356.377499][T26989] free:1601817 free_pcp:2966 free_cma:0 [ 1356.422673][T26989] Node 0 active_anon:7156kB inactive_anon:67428kB active_file:15836kB inactive_file:35340kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:78692kB dirty:124kB writeback:0kB shmem:11500kB writeback_tmp:0kB kernel_stack:3296kB pagetables:2096kB sec_pagetables:0kB all_unreclaimable? no [ 1356.450699][T26989] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1356.477724][T26989] lowmem_reserve[]: 0 2896 7874 7874 [ 1356.483225][T26989] Node 0 DMA32 free:2965464kB boost:0kB min:4172kB low:7136kB high:10100kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2969140kB mlocked:0kB bounce:0kB free_pcp:3676kB local_pcp:1712kB free_cma:0kB [ 1356.512002][T26989] lowmem_reserve[]: 0 0 4978 4978 [ 1356.517077][T26989] Node 0 Normal free:3647888kB boost:0kB min:7172kB low:12268kB high:17364kB reserved_highatomic:0KB active_anon:7164kB inactive_anon:67456kB active_file:15832kB inactive_file:35344kB unevictable:0kB writepending:124kB present:5242880kB managed:5098224kB mlocked:0kB bounce:0kB free_pcp:6292kB local_pcp:3912kB free_cma:0kB [ 1356.547413][T26989] lowmem_reserve[]: 0 0 0 0 [ 1356.551933][T26989] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1356.564637][T26989] Node 0 DMA32: 2*4kB (M) 0*8kB 1*16kB (M) 2*32kB (M) 2*64kB (M) 2*128kB (M) 2*256kB (M) 2*512kB (M) 2*1024kB (M) 2*2048kB (M) 722*4096kB (M) = 2965464kB [ 1356.580584][T26989] Node 0 Normal: 3096*4kB (UME) 1556*8kB (UME) 910*16kB (UME) 548*32kB (UME) 594*64kB (UME) 387*128kB (UME) 203*256kB (UM) 126*512kB (UME) 99*1024kB (UME) 150*2048kB (U) 753*4096kB (UM) = 3753824kB [ 1356.601119][T26989] Node 0 hugepages_total=8 hugepages_free=8 hugepages_surp=4 hugepages_size=2048kB [ 1356.610438][T26989] 15671 total pagecache pages [ 1356.615223][T26989] 0 pages in swap cache [ 1356.619377][T26989] Free swap = 0kB [ 1356.623099][T26989] Total swap = 0kB [ 1356.626841][T26989] 2097051 pages RAM [ 1356.630691][T26989] 0 pages HighMem/MovableOnly [ 1356.635380][T26989] 76370 pages reserved 19:17:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r2 = getpid() kcmp(0xffffffffffffffff, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xff, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x25, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:55 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00), 0x4) 19:17:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x3}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x4}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0xff, 0x61b430263da3e261, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0xff, 0x61b430263da3e261], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r2 = getpid() kcmp(0xffffffffffffffff, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0xa}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:57 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00), 0x4) [ 1357.949735][T27038] xt_check_table_hooks: 4 callbacks suppressed [ 1357.949748][T27038] x_tables: duplicate underflow at hook 2 19:17:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x10}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], [], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], [], 0x0, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x64}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1358.048063][T27049] x_tables: duplicate underflow at hook 2 19:17:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1358.139841][T27062] x_tables: duplicate underflow at hook 2 19:17:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r2 = getpid() kcmp(0xffffffffffffffff, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x0, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0xa}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x0, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00), 0x4) 19:17:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x27}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x2b}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:17:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x2d}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:17:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:17:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x60}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:17:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:17:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1360.320113][T27116] x_tables: duplicate underflow at hook 2 [ 1360.816916][T27099] syz-executor.1 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1360.830428][T27099] CPU: 1 PID: 27099 Comm: syz-executor.1 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1360.840757][T27099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1360.850815][T27099] Call Trace: [ 1360.854103][T27099] [ 1360.857104][T27099] dump_stack_lvl+0xda/0x130 [ 1360.861801][T27099] dump_stack+0x15/0x20 [ 1360.866088][T27099] dump_header+0x95/0x3c0 [ 1360.870532][T27099] oom_kill_process+0xe3/0x3e0 [ 1360.875314][T27099] out_of_memory+0x9f0/0xc30 [ 1360.879950][T27099] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1360.886121][T27099] mem_cgroup_out_of_memory+0x139/0x190 [ 1360.891722][T27099] try_charge_memcg+0x759/0xd20 [ 1360.896599][T27099] obj_cgroup_charge_pages+0xab/0x130 [ 1360.902051][T27099] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1360.907637][T27099] __alloc_pages+0x1bb/0x340 [ 1360.912478][T27099] alloc_pages+0x3e1/0x4e0 [ 1360.917342][T27099] __vmalloc_node_range+0x6d2/0xeb0 [ 1360.922613][T27099] kvmalloc_node+0x121/0x160 [ 1360.927221][T27099] ? xt_alloc_table_info+0x3d/0x80 [ 1360.932390][T27099] xt_alloc_table_info+0x3d/0x80 [ 1360.937333][T27099] do_ip6t_set_ctl+0x614/0x17d0 [ 1360.942242][T27099] ? finish_task_switch+0xac/0x280 [ 1360.947353][T27099] ? __schedule+0x633/0x8b0 [ 1360.951870][T27099] ? futex_unqueue+0xba/0xe0 [ 1360.956489][T27099] ? futex_wait+0x3c3/0x410 [ 1360.961020][T27099] ? __rcu_read_unlock+0x4d/0x70 [ 1360.966093][T27099] nf_setsockopt+0x18d/0x1b0 [ 1360.970751][T27099] ipv6_setsockopt+0x11c/0x130 [ 1360.975556][T27099] rawv6_setsockopt+0x21e/0x410 [ 1360.980507][T27099] sock_common_setsockopt+0x61/0x70 [ 1360.985794][T27099] ? sock_common_recvmsg+0xe0/0xe0 [ 1360.990969][T27099] __sys_setsockopt+0x1c3/0x230 [ 1360.996485][T27099] __x64_sys_setsockopt+0x66/0x80 [ 1361.001558][T27099] do_syscall_64+0x41/0xc0 [ 1361.006072][T27099] ? syscall_exit_to_user_mode+0x26/0x140 [ 1361.011804][T27099] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1361.017706][T27099] RIP: 0033:0x7fdf27376169 [ 1361.022118][T27099] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1361.041802][T27099] RSP: 002b:00007fdf266e9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1361.050284][T27099] RAX: ffffffffffffffda RBX: 00007fdf27495f80 RCX: 00007fdf27376169 [ 1361.058596][T27099] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1361.066743][T27099] RBP: 00007fdf273d1ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1361.074786][T27099] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1361.082875][T27099] R13: 00007ffc813f134f R14: 00007fdf266e9300 R15: 0000000000022000 [ 1361.090858][T27099] [ 1361.093950][T27099] memory: usage 307168kB, limit 307200kB, failcnt 3151 [ 1361.100906][T27099] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1361.107781][T27099] Memory cgroup stats for /syz1: [ 1361.111674][T27099] anon 135168 [ 1361.111674][T27099] file 28672 [ 1361.111674][T27099] kernel 314376192 [ 1361.111674][T27099] kernel_stack 16384 [ 1361.111674][T27099] pagetables 77824 [ 1361.111674][T27099] sec_pagetables 0 [ 1361.111674][T27099] percpu 64 [ 1361.111674][T27099] sock 0 [ 1361.111674][T27099] vmalloc 0 [ 1361.111674][T27099] shmem 28672 [ 1361.111674][T27099] file_mapped 28672 [ 1361.111674][T27099] file_dirty 0 [ 1361.111674][T27099] file_writeback 0 [ 1361.111674][T27099] swapcached 0 [ 1361.111674][T27099] inactive_anon 135168 [ 1361.111674][T27099] active_anon 28672 [ 1361.111674][T27099] inactive_file 0 [ 1361.111674][T27099] active_file 0 [ 1361.111674][T27099] unevictable 0 [ 1361.111674][T27099] slab_reclaimable 79800 [ 1361.111674][T27099] slab_unreclaimable 590744 [ 1361.111674][T27099] slab 670544 [ 1361.111674][T27099] workingset_refault_anon 0 [ 1361.111674][T27099] workingset_refault_file 35 [ 1361.111674][T27099] workingset_activate_anon 0 [ 1361.111674][T27099] workingset_activate_file 0 [ 1361.111674][T27099] workingset_restore_anon 0 [ 1361.111674][T27099] workingset_restore_file 0 [ 1361.111674][T27099] workingset_nodereclaim 0 [ 1361.111674][T27099] pgscan 1049 [ 1361.111674][T27099] pgsteal 170 [ 1361.111674][T27099] pgscan_kswapd 0 [ 1361.111674][T27099] pgscan_direct 1049 [ 1361.111674][T27099] pgscan_khugepaged 0 [ 1361.111674][T27099] pgsteal_kswapd 0 [ 1361.111674][T27099] pgsteal_direct 170 [ 1361.111674][T27099] pgsteal_khugepaged 0 [ 1361.111674][T27099] pgfault 770930 [ 1361.111674][T27099] pgmajfault 0 [ 1361.111674][T27099] pgrefill 1057 [ 1361.111674][T27099] pgactivate 917 [ 1361.111674][T27099] pgdeactivate 1057 [ 1361.111674][T27099] pglazyfree 0 [ 1361.111674][T27099] pglazyfreed 0 [ 1361.275623][T27099] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=27097,uid=0 [ 1361.291020][T27099] Memory cgroup out of memory: Killed process 27099 (syz-executor.1) total-vm:46484kB, anon-rss:500kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:18:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x2}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x3}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[], 0x0, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1361.486035][T27123] x_tables: duplicate underflow at hook 2 19:18:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) 19:18:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1361.537618][T27136] x_tables: duplicate underflow at hook 2 [ 1361.770983][T27127] ================================================================== [ 1361.779173][T27127] BUG: KCSAN: data-race in __refill_stock / drain_all_stock [ 1361.786482][T27127] [ 1361.788799][T27127] read-write to 0xffff888237c2a4f0 of 4 bytes by task 27132 on cpu 0: [ 1361.796946][T27127] __refill_stock+0x7c/0xb0 [ 1361.801452][T27127] obj_cgroup_uncharge_pages+0xfb/0x1a0 [ 1361.807087][T27127] __memcg_kmem_uncharge_page+0x53/0x100 [ 1361.812720][T27127] free_unref_page_prepare+0x65/0x2a0 [ 1361.818102][T27127] free_unref_page+0x34/0x170 [ 1361.822788][T27127] vfree+0x27c/0x420 [ 1361.826686][T27127] __vmalloc_node_range+0xdf0/0xeb0 [ 1361.831897][T27127] kvmalloc_node+0x121/0x160 [ 1361.836577][T27127] xt_alloc_table_info+0x3d/0x80 [ 1361.841509][T27127] do_ip6t_set_ctl+0x614/0x17d0 [ 1361.846413][T27127] nf_setsockopt+0x18d/0x1b0 [ 1361.851002][T27127] ipv6_setsockopt+0x11c/0x130 [ 1361.855766][T27127] rawv6_setsockopt+0x21e/0x410 [ 1361.860622][T27127] sock_common_setsockopt+0x61/0x70 [ 1361.865917][T27127] __sys_setsockopt+0x1c3/0x230 [ 1361.870772][T27127] __x64_sys_setsockopt+0x66/0x80 [ 1361.875798][T27127] do_syscall_64+0x41/0xc0 [ 1361.880240][T27127] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1361.886147][T27127] [ 1361.888466][T27127] read to 0xffff888237c2a4f0 of 4 bytes by task 27127 on cpu 1: [ 1361.896096][T27127] drain_all_stock+0xd3/0x2d0 [ 1361.901215][T27127] try_charge_memcg+0x6c2/0xd20 [ 1361.906069][T27127] obj_cgroup_charge_pages+0xab/0x130 [ 1361.911546][T27127] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1361.917115][T27127] __alloc_pages+0x1bb/0x340 [ 1361.921806][T27127] alloc_pages+0x3e1/0x4e0 [ 1361.926660][T27127] __vmalloc_node_range+0x6d2/0xeb0 [ 1361.931888][T27127] kvmalloc_node+0x121/0x160 [ 1361.936484][T27127] xt_alloc_table_info+0x3d/0x80 [ 1361.941425][T27127] do_ip6t_set_ctl+0x614/0x17d0 [ 1361.946388][T27127] nf_setsockopt+0x18d/0x1b0 [ 1361.951072][T27127] ipv6_setsockopt+0x11c/0x130 [ 1361.955931][T27127] rawv6_setsockopt+0x21e/0x410 [ 1361.961667][T27127] sock_common_setsockopt+0x61/0x70 [ 1361.966986][T27127] __sys_setsockopt+0x1c3/0x230 [ 1361.971847][T27127] __x64_sys_setsockopt+0x66/0x80 [ 1361.976886][T27127] do_syscall_64+0x41/0xc0 [ 1361.981308][T27127] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1361.987207][T27127] [ 1361.989531][T27127] value changed: 0x00000025 -> 0x00000023 [ 1361.995241][T27127] [ 1361.997556][T27127] Reported by Kernel Concurrency Sanitizer on: [ 1362.003696][T27127] CPU: 1 PID: 27127 Comm: syz-executor.5 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1362.013955][T27127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1362.024093][T27127] ================================================================== [ 1362.233626][T27132] syz-executor.1 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1362.247180][T27132] CPU: 0 PID: 27132 Comm: syz-executor.1 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1362.257406][T27132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1362.267474][T27132] Call Trace: [ 1362.270752][T27132] [ 1362.273730][T27132] dump_stack_lvl+0xda/0x130 [ 1362.278365][T27132] dump_stack+0x15/0x20 [ 1362.282531][T27132] dump_header+0x95/0x3c0 [ 1362.286887][T27132] oom_kill_process+0xe3/0x3e0 [ 1362.291680][T27132] out_of_memory+0x9f0/0xc30 [ 1362.296348][T27132] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1362.302598][T27132] mem_cgroup_out_of_memory+0x139/0x190 [ 1362.308255][T27132] try_charge_memcg+0x759/0xd20 [ 1362.313112][T27132] obj_cgroup_charge_pages+0xab/0x130 [ 1362.318492][T27132] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1362.324105][T27132] __alloc_pages+0x1bb/0x340 [ 1362.328734][T27132] alloc_pages+0x3e1/0x4e0 [ 1362.333157][T27132] __vmalloc_node_range+0x6d2/0xeb0 [ 1362.338490][T27132] kvmalloc_node+0x121/0x160 [ 1362.343098][T27132] ? xt_alloc_table_info+0x3d/0x80 [ 1362.348220][T27132] xt_alloc_table_info+0x3d/0x80 [ 1362.353250][T27132] do_ip6t_set_ctl+0x614/0x17d0 [ 1362.358134][T27132] ? finish_task_switch+0xac/0x280 [ 1362.363250][T27132] ? __schedule+0x633/0x8b0 [ 1362.367993][T27132] ? futex_unqueue+0xba/0xe0 [ 1362.372627][T27132] ? futex_wait+0x3c3/0x410 [ 1362.377157][T27132] ? __rcu_read_unlock+0x4d/0x70 [ 1362.382091][T27132] nf_setsockopt+0x18d/0x1b0 [ 1362.386721][T27132] ipv6_setsockopt+0x11c/0x130 [ 1362.391474][T27132] rawv6_setsockopt+0x21e/0x410 [ 1362.396353][T27132] sock_common_setsockopt+0x61/0x70 [ 1362.401549][T27132] ? sock_common_recvmsg+0xe0/0xe0 [ 1362.406705][T27132] __sys_setsockopt+0x1c3/0x230 [ 1362.411543][T27132] __x64_sys_setsockopt+0x66/0x80 [ 1362.416624][T27132] do_syscall_64+0x41/0xc0 [ 1362.421103][T27132] ? syscall_exit_to_user_mode+0x26/0x140 [ 1362.426819][T27132] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1362.432709][T27132] RIP: 0033:0x7fdf27376169 [ 1362.437108][T27132] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1362.456797][T27132] RSP: 002b:00007fdf266e9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1362.465200][T27132] RAX: ffffffffffffffda RBX: 00007fdf27495f80 RCX: 00007fdf27376169 [ 1362.473219][T27132] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1362.481211][T27132] RBP: 00007fdf273d1ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1362.489171][T27132] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1362.497210][T27132] R13: 00007ffc813f134f R14: 00007fdf266e9300 R15: 0000000000022000 [ 1362.505189][T27132] [ 1362.508356][T27132] memory: usage 307184kB, limit 307200kB, failcnt 3200 [ 1362.515247][T27132] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1362.522147][T27132] Memory cgroup stats for /syz1: [ 1362.572529][T27132] anon 135168 [ 1362.572529][T27132] file 28672 [ 1362.572529][T27132] kernel 314372096 [ 1362.572529][T27132] kernel_stack 16384 [ 1362.572529][T27132] pagetables 77824 [ 1362.572529][T27132] sec_pagetables 0 [ 1362.572529][T27132] percpu 128 [ 1362.572529][T27132] sock 0 [ 1362.572529][T27132] vmalloc 0 [ 1362.572529][T27132] shmem 28672 [ 1362.572529][T27132] file_mapped 28672 [ 1362.572529][T27132] file_dirty 0 [ 1362.572529][T27132] file_writeback 0 [ 1362.572529][T27132] swapcached 0 [ 1362.572529][T27132] inactive_anon 135168 [ 1362.572529][T27132] active_anon 28672 [ 1362.572529][T27132] inactive_file 0 [ 1362.572529][T27132] active_file 0 [ 1362.572529][T27132] unevictable 0 [ 1362.572529][T27132] slab_reclaimable 79800 [ 1362.572529][T27132] slab_unreclaimable 593232 [ 1362.572529][T27132] slab 673032 [ 1362.572529][T27132] workingset_refault_anon 0 [ 1362.572529][T27132] workingset_refault_file 35 [ 1362.572529][T27132] workingset_activate_anon 0 [ 1362.572529][T27132] workingset_activate_file 0 [ 1362.572529][T27132] workingset_restore_anon 0 [ 1362.572529][T27132] workingset_restore_file 0 [ 1362.572529][T27132] workingset_nodereclaim 0 [ 1362.572529][T27132] pgscan 1049 [ 1362.572529][T27132] pgsteal 170 [ 1362.572529][T27132] pgscan_kswapd 0 [ 1362.572529][T27132] pgscan_direct 1049 [ 1362.572529][T27132] pgscan_khugepaged 0 [ 1362.572529][T27132] pgsteal_kswapd 0 [ 1362.572529][T27132] pgsteal_direct 170 [ 1362.572529][T27132] pgsteal_khugepaged 0 [ 1362.572529][T27132] pgfault 770992 [ 1362.572529][T27132] pgmajfault 0 [ 1362.572529][T27132] pgrefill 1057 [ 1362.572529][T27132] pgactivate 917 [ 1362.572529][T27132] pgdeactivate 1057 [ 1362.572529][T27132] pglazyfree 0 [ 1362.572529][T27132] pglazyfreed 0 [ 1362.735663][T27132] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=27129,uid=0 [ 1362.750955][T27132] Memory cgroup out of memory: Killed process 27132 (syz-executor.1) total-vm:46484kB, anon-rss:372kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:18:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) 19:18:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x4}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:18:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) 19:18:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:18:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x5}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1362.903062][T27150] x_tables: duplicate underflow at hook 2 19:18:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 19:18:02 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) 19:18:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x6}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1362.947257][T27163] x_tables: duplicate underflow at hook 2 [ 1363.002210][T27172] x_tables: duplicate underflow at hook 2 [ 1363.605882][T27153] syz-executor.5 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1363.619415][T27153] CPU: 0 PID: 27153 Comm: syz-executor.5 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1363.629793][T27153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1363.640116][T27153] Call Trace: [ 1363.643459][T27153] [ 1363.646393][T27153] dump_stack_lvl+0xda/0x130 [ 1363.651028][T27153] dump_stack+0x15/0x20 [ 1363.655237][T27153] dump_header+0x95/0x3c0 [ 1363.659781][T27153] oom_kill_process+0xe3/0x3e0 [ 1363.664637][T27153] out_of_memory+0x9f0/0xc30 [ 1363.669287][T27153] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1363.675433][T27153] mem_cgroup_out_of_memory+0x139/0x190 [ 1363.681006][T27153] try_charge_memcg+0x759/0xd20 [ 1363.685871][T27153] obj_cgroup_charge_pages+0xab/0x130 [ 1363.691288][T27153] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1363.696919][T27153] __alloc_pages+0x1bb/0x340 [ 1363.701530][T27153] alloc_pages+0x3e1/0x4e0 [ 1363.705960][T27153] __vmalloc_node_range+0x6d2/0xeb0 [ 1363.711170][T27153] kvmalloc_node+0x121/0x160 [ 1363.715821][T27153] ? xt_alloc_table_info+0x3d/0x80 [ 1363.720932][T27153] xt_alloc_table_info+0x3d/0x80 [ 1363.725969][T27153] do_ip6t_set_ctl+0x614/0x17d0 [ 1363.730863][T27153] ? __schedule+0x633/0x8b0 [ 1363.735385][T27153] ? futex_unqueue+0xba/0xe0 [ 1363.739986][T27153] ? futex_wait+0x3c3/0x410 [ 1363.744545][T27153] ? __rcu_read_unlock+0x4d/0x70 [ 1363.749531][T27153] nf_setsockopt+0x18d/0x1b0 [ 1363.754187][T27153] ipv6_setsockopt+0x11c/0x130 [ 1363.758959][T27153] rawv6_setsockopt+0x21e/0x410 [ 1363.763823][T27153] sock_common_setsockopt+0x61/0x70 [ 1363.769093][T27153] ? sock_common_recvmsg+0xe0/0xe0 [ 1363.774273][T27153] __sys_setsockopt+0x1c3/0x230 [ 1363.779221][T27153] __x64_sys_setsockopt+0x66/0x80 [ 1363.784258][T27153] do_syscall_64+0x41/0xc0 [ 1363.788730][T27153] ? syscall_exit_to_user_mode+0x26/0x140 [ 1363.794513][T27153] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1363.800417][T27153] RIP: 0033:0x7fe9e458e169 [ 1363.804853][T27153] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1363.824512][T27153] RSP: 002b:00007fe9e3901168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1363.833022][T27153] RAX: ffffffffffffffda RBX: 00007fe9e46adf80 RCX: 00007fe9e458e169 [ 1363.841081][T27153] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1363.849153][T27153] RBP: 00007fe9e45e9ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1363.857191][T27153] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1363.865241][T27153] R13: 00007ffd93c3db2f R14: 00007fe9e3901300 R15: 0000000000022000 [ 1363.873819][T27153] [ 1363.876902][T27153] memory: usage 307184kB, limit 307200kB, failcnt 3973 [ 1363.883757][T27153] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1363.890669][T27153] Memory cgroup stats for /syz5: [ 1363.894638][T27153] anon 126976 [ 1363.894638][T27153] file 28672 [ 1363.894638][T27153] kernel 314384384 [ 1363.894638][T27153] kernel_stack 16384 [ 1363.894638][T27153] pagetables 77824 [ 1363.894638][T27153] sec_pagetables 0 [ 1363.894638][T27153] percpu 64 [ 1363.894638][T27153] sock 0 [ 1363.894638][T27153] vmalloc 0 [ 1363.894638][T27153] shmem 28672 [ 1363.894638][T27153] file_mapped 24576 [ 1363.894638][T27153] file_dirty 0 [ 1363.894638][T27153] file_writeback 0 [ 1363.894638][T27153] swapcached 0 [ 1363.894638][T27153] inactive_anon 131072 [ 1363.894638][T27153] active_anon 24576 [ 1363.894638][T27153] inactive_file 0 [ 1363.894638][T27153] active_file 0 [ 1363.894638][T27153] unevictable 0 [ 1363.894638][T27153] slab_reclaimable 113800 [ 1363.894638][T27153] slab_unreclaimable 839144 [ 1363.894638][T27153] slab 952944 [ 1363.894638][T27153] workingset_refault_anon 0 [ 1363.894638][T27153] workingset_refault_file 21 [ 1363.894638][T27153] workingset_activate_anon 0 [ 1363.894638][T27153] workingset_activate_file 0 [ 1363.894638][T27153] workingset_restore_anon 0 [ 1363.894638][T27153] workingset_restore_file 0 [ 1363.894638][T27153] workingset_nodereclaim 0 [ 1363.894638][T27153] pgscan 1384 [ 1363.894638][T27153] pgsteal 155 [ 1363.894638][T27153] pgscan_kswapd 0 [ 1363.894638][T27153] pgscan_direct 1384 [ 1363.894638][T27153] pgscan_khugepaged 0 [ 1363.894638][T27153] pgsteal_kswapd 0 [ 1363.894638][T27153] pgsteal_direct 155 [ 1363.894638][T27153] pgsteal_khugepaged 0 [ 1363.894638][T27153] pgfault 733889 [ 1363.894638][T27153] pgmajfault 0 [ 1363.894638][T27153] pgrefill 1398 [ 1363.894638][T27153] pgactivate 1267 [ 1363.894638][T27153] pgdeactivate 1398 [ 1363.894638][T27153] pglazyfree 0 [ 1363.894638][T27153] pglazyfreed 0 [ 1364.059424][T27153] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27149,uid=0 [ 1364.075032][T27153] Memory cgroup out of memory: Killed process 27153 (syz-executor.5) total-vm:46484kB, anon-rss:372kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, r0, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[0x3], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x7}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1364.110081][T27178] x_tables: duplicate underflow at hook 2 19:18:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) getpid() 19:18:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x8}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, r0, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[], 0x0, 0x1, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(0xffffffffffffffff, r0, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r3 = getpid() kcmp(0xffffffffffffffff, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0x9}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:03 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) [ 1364.266666][T27189] x_tables: duplicate underflow at hook 2 [ 1364.329135][T27200] x_tables: duplicate underflow at hook 2 [ 1364.813393][T27194] syz-executor.5 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1364.826951][T27194] CPU: 0 PID: 27194 Comm: syz-executor.5 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1364.837080][T27194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1364.847156][T27194] Call Trace: [ 1364.850594][T27194] [ 1364.853506][T27194] dump_stack_lvl+0xda/0x130 [ 1364.858093][T27194] dump_stack+0x15/0x20 [ 1364.862284][T27194] dump_header+0x95/0x3c0 [ 1364.866624][T27194] oom_kill_process+0xe3/0x3e0 [ 1364.871449][T27194] out_of_memory+0x9f0/0xc30 [ 1364.876298][T27194] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1364.882818][T27194] mem_cgroup_out_of_memory+0x139/0x190 [ 1364.888393][T27194] try_charge_memcg+0x759/0xd20 [ 1364.893235][T27194] obj_cgroup_charge_pages+0xab/0x130 [ 1364.898653][T27194] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1364.904187][T27194] __alloc_pages+0x1bb/0x340 [ 1364.908878][T27194] alloc_pages+0x3e1/0x4e0 [ 1364.913301][T27194] __vmalloc_node_range+0x6d2/0xeb0 [ 1364.918538][T27194] kvmalloc_node+0x121/0x160 [ 1364.923153][T27194] ? xt_alloc_table_info+0x3d/0x80 [ 1364.928248][T27194] xt_alloc_table_info+0x3d/0x80 [ 1364.933187][T27194] do_ip6t_set_ctl+0x614/0x17d0 [ 1364.938023][T27194] ? finish_task_switch+0xac/0x280 [ 1364.943153][T27194] ? __schedule+0x633/0x8b0 [ 1364.947716][T27194] ? futex_unqueue+0xba/0xe0 [ 1364.952378][T27194] ? futex_wait+0x3c3/0x410 [ 1364.956943][T27194] ? __rcu_read_unlock+0x4d/0x70 [ 1364.961931][T27194] nf_setsockopt+0x18d/0x1b0 [ 1364.966526][T27194] ipv6_setsockopt+0x11c/0x130 [ 1364.971304][T27194] rawv6_setsockopt+0x21e/0x410 [ 1364.976158][T27194] sock_common_setsockopt+0x61/0x70 [ 1364.981381][T27194] ? sock_common_recvmsg+0xe0/0xe0 [ 1364.986627][T27194] __sys_setsockopt+0x1c3/0x230 [ 1364.992561][T27194] __x64_sys_setsockopt+0x66/0x80 [ 1364.997594][T27194] do_syscall_64+0x41/0xc0 [ 1365.002039][T27194] ? syscall_exit_to_user_mode+0x26/0x140 [ 1365.008129][T27194] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1365.014162][T27194] RIP: 0033:0x7fe9e458e169 [ 1365.018672][T27194] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1365.038607][T27194] RSP: 002b:00007fe9e3901168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1365.047051][T27194] RAX: ffffffffffffffda RBX: 00007fe9e46adf80 RCX: 00007fe9e458e169 [ 1365.055006][T27194] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1365.063040][T27194] RBP: 00007fe9e45e9ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1365.071145][T27194] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1365.079619][T27194] R13: 00007ffd93c3db2f R14: 00007fe9e3901300 R15: 0000000000022000 [ 1365.087584][T27194] [ 1365.090624][T27194] memory: usage 307200kB, limit 307200kB, failcnt 4038 [ 1365.097468][T27194] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1365.104419][T27194] Memory cgroup stats for /syz5: [ 1365.105213][T27194] anon 126976 [ 1365.105213][T27194] file 28672 [ 1365.105213][T27194] kernel 314417152 [ 1365.105213][T27194] kernel_stack 49152 [ 1365.105213][T27194] pagetables 77824 [ 1365.105213][T27194] sec_pagetables 0 [ 1365.105213][T27194] percpu 128 [ 1365.105213][T27194] sock 0 [ 1365.105213][T27194] vmalloc 0 [ 1365.105213][T27194] shmem 28672 [ 1365.105213][T27194] file_mapped 24576 [ 1365.105213][T27194] file_dirty 0 [ 1365.105213][T27194] file_writeback 0 [ 1365.105213][T27194] swapcached 0 [ 1365.105213][T27194] inactive_anon 131072 [ 1365.105213][T27194] active_anon 24576 [ 1365.105213][T27194] inactive_file 0 [ 1365.105213][T27194] active_file 0 [ 1365.105213][T27194] unevictable 0 [ 1365.105213][T27194] slab_reclaimable 113800 [ 1365.105213][T27194] slab_unreclaimable 845936 [ 1365.105213][T27194] slab 959736 [ 1365.105213][T27194] workingset_refault_anon 0 [ 1365.105213][T27194] workingset_refault_file 21 [ 1365.105213][T27194] workingset_activate_anon 0 [ 1365.105213][T27194] workingset_activate_file 0 [ 1365.105213][T27194] workingset_restore_anon 0 [ 1365.105213][T27194] workingset_restore_file 0 [ 1365.105213][T27194] workingset_nodereclaim 0 [ 1365.105213][T27194] pgscan 1384 [ 1365.105213][T27194] pgsteal 155 [ 1365.105213][T27194] pgscan_kswapd 0 [ 1365.105213][T27194] pgscan_direct 1384 [ 1365.105213][T27194] pgscan_khugepaged 0 [ 1365.105213][T27194] pgsteal_kswapd 0 [ 1365.105213][T27194] pgsteal_direct 155 [ 1365.105213][T27194] pgsteal_khugepaged 0 [ 1365.105213][T27194] pgfault 733947 [ 1365.105213][T27194] pgmajfault 0 [ 1365.105213][T27194] pgrefill 1398 [ 1365.105213][T27194] pgactivate 1267 [ 1365.105213][T27194] pgdeactivate 1398 [ 1365.105213][T27194] pglazyfree 0 [ 1365.105213][T27194] pglazyfreed 0 [ 1365.268816][T27194] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27193,uid=0 [ 1365.284255][T27194] Memory cgroup out of memory: Killed process 27194 (syz-executor.5) total-vm:46484kB, anon-rss:500kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:18:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}, {[], 0x0, 0x0, 0x2}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:04 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0xa}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:04 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}}, @common=@ah={{0x30}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:04 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x23}}, @common=@ah={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0xb}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:04 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 1365.471097][T27216] x_tables: duplicate underflow at hook 2 [ 1365.528915][T27234] x_tables: duplicate underflow at hook 2 [ 1365.890084][T27222] syz-executor.5 invoked oom-killer: gfp_mask=0x402cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 1365.903608][T27222] CPU: 0 PID: 27222 Comm: syz-executor.5 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1365.913676][T27222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1365.923763][T27222] Call Trace: [ 1365.927463][T27222] [ 1365.930439][T27222] dump_stack_lvl+0xda/0x130 [ 1365.935111][T27222] dump_stack+0x15/0x20 [ 1365.939247][T27222] dump_header+0x95/0x3c0 [ 1365.943873][T27222] oom_kill_process+0xe3/0x3e0 [ 1365.948656][T27222] out_of_memory+0x9f0/0xc30 [ 1365.953246][T27222] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 1365.959506][T27222] mem_cgroup_out_of_memory+0x139/0x190 [ 1365.965105][T27222] try_charge_memcg+0x759/0xd20 [ 1365.970074][T27222] obj_cgroup_charge_pages+0xab/0x130 [ 1365.975427][T27222] __memcg_kmem_charge_page+0x1d5/0x2c0 [ 1365.980950][T27222] __alloc_pages+0x1bb/0x340 [ 1365.985599][T27222] alloc_pages+0x3e1/0x4e0 [ 1365.990052][T27222] __vmalloc_node_range+0x6d2/0xeb0 [ 1365.995252][T27222] kvmalloc_node+0x121/0x160 [ 1365.999882][T27222] ? xt_alloc_table_info+0x3d/0x80 [ 1366.004984][T27222] xt_alloc_table_info+0x3d/0x80 [ 1366.009987][T27222] do_ip6t_set_ctl+0x614/0x17d0 [ 1366.014931][T27222] ? finish_task_switch+0x198/0x280 [ 1366.020109][T27222] ? put_task_struct_rcu_user+0x5b/0x80 [ 1366.025722][T27222] ? __schedule+0x633/0x8b0 [ 1366.030208][T27222] ? futex_unqueue+0xba/0xe0 [ 1366.034801][T27222] ? futex_wait+0x3c3/0x410 [ 1366.039359][T27222] ? __rcu_read_unlock+0x4d/0x70 [ 1366.044298][T27222] nf_setsockopt+0x18d/0x1b0 [ 1366.048935][T27222] ipv6_setsockopt+0x11c/0x130 [ 1366.053766][T27222] rawv6_setsockopt+0x21e/0x410 [ 1366.058704][T27222] sock_common_setsockopt+0x61/0x70 [ 1366.063924][T27222] ? sock_common_recvmsg+0xe0/0xe0 [ 1366.069029][T27222] __sys_setsockopt+0x1c3/0x230 [ 1366.073940][T27222] __x64_sys_setsockopt+0x66/0x80 [ 1366.078970][T27222] do_syscall_64+0x41/0xc0 [ 1366.083374][T27222] ? syscall_exit_to_user_mode+0x26/0x140 [ 1366.089262][T27222] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1366.095140][T27222] RIP: 0033:0x7fe9e458e169 [ 1366.099587][T27222] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1366.119230][T27222] RSP: 002b:00007fe9e3901168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1366.127696][T27222] RAX: ffffffffffffffda RBX: 00007fe9e46adf80 RCX: 00007fe9e458e169 [ 1366.135788][T27222] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1366.143748][T27222] RBP: 00007fe9e45e9ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1366.151967][T27222] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1366.159970][T27222] R13: 00007ffd93c3db2f R14: 00007fe9e3901300 R15: 0000000000022000 [ 1366.167930][T27222] [ 1366.170992][T27222] memory: usage 307200kB, limit 307200kB, failcnt 4104 [ 1366.177882][T27222] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1366.184781][T27222] Memory cgroup stats for /syz5: [ 1366.184976][T27222] anon 126976 [ 1366.184976][T27222] file 28672 [ 1366.184976][T27222] kernel 314404864 [ 1366.184976][T27222] kernel_stack 49152 [ 1366.184976][T27222] pagetables 77824 [ 1366.184976][T27222] sec_pagetables 0 [ 1366.184976][T27222] percpu 128 [ 1366.184976][T27222] sock 0 [ 1366.184976][T27222] vmalloc 0 [ 1366.184976][T27222] shmem 28672 [ 1366.184976][T27222] file_mapped 24576 [ 1366.184976][T27222] file_dirty 0 [ 1366.184976][T27222] file_writeback 0 [ 1366.184976][T27222] swapcached 0 [ 1366.184976][T27222] inactive_anon 131072 [ 1366.184976][T27222] active_anon 24576 [ 1366.184976][T27222] inactive_file 0 [ 1366.184976][T27222] active_file 0 [ 1366.184976][T27222] unevictable 0 [ 1366.184976][T27222] slab_reclaimable 113800 [ 1366.184976][T27222] slab_unreclaimable 847400 [ 1366.184976][T27222] slab 961200 [ 1366.184976][T27222] workingset_refault_anon 0 [ 1366.184976][T27222] workingset_refault_file 21 [ 1366.184976][T27222] workingset_activate_anon 0 [ 1366.184976][T27222] workingset_activate_file 0 [ 1366.184976][T27222] workingset_restore_anon 0 [ 1366.184976][T27222] workingset_restore_file 0 [ 1366.184976][T27222] workingset_nodereclaim 0 [ 1366.184976][T27222] pgscan 1384 [ 1366.184976][T27222] pgsteal 155 [ 1366.184976][T27222] pgscan_kswapd 0 [ 1366.184976][T27222] pgscan_direct 1384 [ 1366.184976][T27222] pgscan_khugepaged 0 [ 1366.184976][T27222] pgsteal_kswapd 0 [ 1366.184976][T27222] pgsteal_direct 155 [ 1366.184976][T27222] pgsteal_khugepaged 0 [ 1366.184976][T27222] pgfault 734008 [ 1366.184976][T27222] pgmajfault 0 [ 1366.184976][T27222] pgrefill 1398 [ 1366.184976][T27222] pgactivate 1267 [ 1366.184976][T27222] pgdeactivate 1398 [ 1366.184976][T27222] pglazyfree 0 [ 1366.184976][T27222] pglazyfreed 0 [ 1366.348507][T27222] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=27220,uid=0 [ 1366.364190][T27222] Memory cgroup out of memory: Killed process 27222 (syz-executor.5) total-vm:46484kB, anon-rss:372kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 19:18:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:05 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "6a460205754fac06c42b7eb190ae7a503e6588eb0f728d221995abda8f2d852aab0a72971963906848c423de85c9e346e9fc5adb658adf73e37ad10222650abfc73022ca7f516c3b3d19bf427ca59be2d9948ee9358c25f0669592a0aa3fdd9688080b9ec113de94f7b57cec0f8257e7eb0a37c540a74089cdfee6463e1b7f3519578a0a2bc5e71534f19126132f1d3642522af4fb47857bd9c648e40d8a847eed15f6ea391c1be96cbd84e9d770304b214b7437201e891172970078885c31e135ecdcfa18eb82a85258e64aae902ad8a639225e11c9e0337fddb9127c9d42dc7471024056cea9a1c481d33adee25284e16b1017f8a94e6a10727c2da2cf6fa5"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0xc}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:05 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0xd}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:05 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) [ 1366.528202][T27244] x_tables: duplicate underflow at hook 2 [ 1366.591196][T27261] x_tables: duplicate underflow at hook 2 [ 1366.764215][T27249] warn_alloc: 27 callbacks suppressed [ 1366.764229][T27249] syz-executor.5: vmalloc error: size 312475648, page order 9, failed to allocate pages, mode:0x400cc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM), nodemask=(null),cpuset=syz5,mems_allowed=0 [ 1366.787869][T27249] CPU: 1 PID: 27249 Comm: syz-executor.5 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0 [ 1366.797993][T27249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 [ 1366.808087][T27249] Call Trace: [ 1366.811440][T27249] [ 1366.814586][T27249] dump_stack_lvl+0xda/0x130 [ 1366.819205][T27249] dump_stack+0x15/0x20 [ 1366.823352][T27249] warn_alloc+0x140/0x1b0 [ 1366.827692][T27249] ? __rcu_read_unlock+0x4d/0x70 [ 1366.832634][T27249] __vmalloc_node_range+0xc7c/0xeb0 [ 1366.837964][T27249] kvmalloc_node+0x121/0x160 [ 1366.842674][T27249] ? xt_alloc_table_info+0x3d/0x80 [ 1366.847850][T27249] xt_alloc_table_info+0x3d/0x80 [ 1366.852777][T27249] do_ip6t_set_ctl+0x614/0x17d0 [ 1366.857672][T27249] ? finish_task_switch+0xac/0x280 [ 1366.862929][T27249] ? __schedule+0x633/0x8b0 [ 1366.867456][T27249] ? futex_unqueue+0xba/0xe0 [ 1366.872037][T27249] ? futex_wait+0x3c3/0x410 [ 1366.876580][T27249] ? __rcu_read_unlock+0x4d/0x70 [ 1366.881530][T27249] nf_setsockopt+0x18d/0x1b0 [ 1366.886199][T27249] ipv6_setsockopt+0x11c/0x130 [ 1366.890955][T27249] rawv6_setsockopt+0x21e/0x410 [ 1366.895817][T27249] sock_common_setsockopt+0x61/0x70 [ 1366.901379][T27249] ? sock_common_recvmsg+0xe0/0xe0 [ 1366.906487][T27249] __sys_setsockopt+0x1c3/0x230 [ 1366.911330][T27249] __x64_sys_setsockopt+0x66/0x80 [ 1366.916423][T27249] do_syscall_64+0x41/0xc0 [ 1366.920864][T27249] ? syscall_exit_to_user_mode+0x26/0x140 [ 1366.926731][T27249] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1366.932713][T27249] RIP: 0033:0x7fe9e458e169 [ 1366.937130][T27249] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1366.956750][T27249] RSP: 002b:00007fe9e3901168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1366.965315][T27249] RAX: ffffffffffffffda RBX: 00007fe9e46adf80 RCX: 00007fe9e458e169 [ 1366.973338][T27249] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1366.981336][T27249] RBP: 00007fe9e45e9ca1 R08: 0000000000000490 R09: 0000000000000000 [ 1366.989388][T27249] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1366.997460][T27249] R13: 00007ffd93c3db2f R14: 00007fe9e3901300 R15: 0000000000022000 [ 1367.005422][T27249] [ 1367.008456][T27249] Mem-Info: [ 1367.011558][T27249] active_anon:1752 inactive_anon:16882 isolated_anon:0 [ 1367.011558][T27249] active_file:3965 inactive_file:8835 isolated_file:0 [ 1367.011558][T27249] unevictable:0 dirty:40 writeback:0 [ 1367.011558][T27249] slab_reclaimable:6909 slab_unreclaimable:16954 [ 1367.011558][T27249] mapped:19673 shmem:2840 pagetables:532 [ 1367.011558][T27249] sec_pagetables:0 bounce:0 [ 1367.011558][T27249] kernel_misc_reclaimable:0 [ 1367.011558][T27249] free:1677924 free_pcp:2855 free_cma:0 [ 1367.056613][T27249] Node 0 active_anon:7008kB inactive_anon:67528kB active_file:15860kB inactive_file:35340kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:78692kB dirty:160kB writeback:0kB shmem:11360kB writeback_tmp:0kB kernel_stack:2800kB pagetables:2128kB sec_pagetables:0kB all_unreclaimable? no [ 1367.084631][T27249] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1367.111961][T27249] lowmem_reserve[]: 0 2896 7874 7874 [ 1367.117356][T27249] Node 0 DMA32 free:2965464kB boost:0kB min:4172kB low:7136kB high:10100kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2969140kB mlocked:0kB bounce:0kB free_pcp:3676kB local_pcp:1964kB free_cma:0kB [ 1367.146088][T27249] lowmem_reserve[]: 0 0 4978 4978 [ 1367.151254][T27249] Node 0 Normal free:4039932kB boost:0kB min:7172kB low:12268kB high:17364kB reserved_highatomic:0KB active_anon:7008kB inactive_anon:67528kB active_file:15860kB inactive_file:35340kB unevictable:0kB writepending:44kB present:5242880kB managed:5098224kB mlocked:0kB bounce:0kB free_pcp:5048kB local_pcp:4016kB free_cma:0kB [ 1367.181879][T27249] lowmem_reserve[]: 0 0 0 0 [ 1367.186403][T27249] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1367.199170][T27249] Node 0 DMA32: 2*4kB (M) 0*8kB 1*16kB (M) 2*32kB (M) 2*64kB (M) 2*128kB (M) 2*256kB (M) 2*512kB (M) 2*1024kB (M) 2*2048kB (M) 722*4096kB (M) = 2965464kB [ 1367.215018][T27249] Node 0 Normal: 2911*4kB (UME) 1440*8kB (UME) 762*16kB (UME) 387*32kB (UME) 450*64kB (UME) 237*128kB (UME) 109*256kB (UM) 67*512kB (UME) 60*1024kB (UME) 123*2048kB (U) 903*4096kB (UM) = 4181116kB [ 1367.234614][T27249] Node 0 hugepages_total=8 hugepages_free=8 hugepages_surp=4 hugepages_size=2048kB [ 1367.243941][T27249] 15640 total pagecache pages [ 1367.248633][T27249] 0 pages in swap cache [ 1367.252843][T27249] Free swap = 0kB [ 1367.256606][T27249] Total swap = 0kB [ 1367.260339][T27249] 2097051 pages RAM [ 1367.264172][T27249] 0 pages HighMem/MovableOnly [ 1367.268928][T27249] 76370 pages reserved 19:18:06 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0x0, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:18:06 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x23}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 19:18:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30, 'ah\x00', 0xe}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0xffffff00, 0xffffffff], [0xff, 0x61b430263da3e261, 0xff, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000580)='./file0\x00', 0xee01, 0x0, 0x1000) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000b00)=0x12, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 19:18:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x1fffffbf, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x30}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x7, 0x40, 0x9, 0x4, @mcast2, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xff, 0x61b430263da3e261, 0x0, 0xff], [0x0, 0x0, 0x0, 0xffffff00], 0x2000, 0x2000}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x0, 0x8, 0x5}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) r4 = getpid() kcmp(0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 19:18:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x400000, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x10d680, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "6371a5", "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"}}, 0x110) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000540)=0x216428, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x200, 0x200, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@frag={{0x30}, {[0x3, 0x10000], 0xfff, 0x1, 0x2}}, @common=@ah={{0x60}, {[0x4d5, 0x4d4], 0x7c, 0x9, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond,