)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) select(0x40, &(0x7f00000000c0)={0xfffffffffffffffa, 0x0, 0xfffffffffffffff8, 0xfff, 0x1000, 0x5, 0x8, 0x5}, &(0x7f0000000100)={0x49a, 0x80000000, 0x4, 0x400, 0x3, 0x9, 0x1, 0xfffffffffffff522}, &(0x7f0000000140)={0xb0, 0x48c, 0x80f, 0x29, 0x3, 0x4, 0x7, 0x3c}, &(0x7f0000000180)) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:12 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffffd) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, "e91f7189591e9233614b00"}, 0x0) [ 287.743100] kernel msg: ebtables bug: please report to author: entries_size too small [ 287.779829] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @local}}, 0xf869}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1, 0x3ff}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0x8001, 0x30}, &(0x7f0000000140)=0xc) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) fanotify_mark(r2, 0x40, 0x8000000, r2, &(0x7f0000000240)='./file0\x00') r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) dup2(r0, r4) 13:40:12 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='filter\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) [ 287.851093] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 287.912346] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:12 executing program 3: socketpair(0x11, 0x3, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000002c0)={@loopback, 0x10, r2}) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x62, 0xa, 0xff00}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000006c0), &(0x7f0000000740)=0x68) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000380)={0x294, r3, 0x201, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xe42}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x1b8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xb4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0xfffffffffffff63e, 0x1, 0x8, 0xd}, {0x7, 0x3, 0x1, 0x4}, {0xffffffff, 0x3, 0x3, 0x7e7}, {0x5, 0x693, 0x8, 0x101}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r2}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0xfffffffffffffffa, 0x5, 0x8001, 0xa340}, {0x3, 0x8001, 0x10000000, 0x9}, {0x800, 0x2, 0x7074, 0x5}, {0x0, 0x6, 0x7, 0x9}, {0xb95, 0x7, 0x3, 0xffffffff}, {0x400, 0x8, 0x5, 0x1}]}}}]}}]}, 0x294}}, 0x40) 13:40:13 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x298100, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000100)=""/248, &(0x7f0000000200)=0xf8) r1 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={0x174, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @local}, 0x200, 0x1, 0x3, 0x7, 0x4, 0x0, 0x4, 0x0, 0x7}) r3 = socket(0xa, 0x1, 0x0) close(r3) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xa6, "c71f4fd50fa76538ffac3a9c0870171a67f5ae5f1f9bfbea0caabfb9e387dfd3829a44baf7203bc0b018549970925feedc53203f807c636c5aba00ecd646cd95fef2d2f73f85e463c89a3cf492e6034f7cad7f479a7ab9741d6038bdf92acb80531c69f6e6688becc1f34f00186cc625c285bd22088ab0cdb408519f0906ba14468c878af8eb0f4f5bcf4ca1d2918bd4156bbcdbcfb70ec5d25e7e24016f078878e388e1d4ad"}, &(0x7f0000000300)=0xae) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000440)={r4, 0x7e}, 0x8) 13:40:13 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102003ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) getpgrp(r3) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 288.078134] kernel msg: ebtables bug: please report to author: entries_size too small [ 288.191821] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:13 executing program 4: r0 = dup(0xffffffffffffffff) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='em0$usernodev)em1$[/bem0,&\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000140)="702ed1d4dedddd82d761d2d400ab139056f80b331834fb44a2beb5364cae12bbd877ae92d1c6947187131d90de81d4229b9e32331558ae2b297446a6fd4f2570096b6eb707b4fceab8b491d5456d15a2a669798aa3a0d4ebd0d65d850f999d2b7908fc8efb1b4b305afadc6b84c459bb5b7a2cccafec6806b76d3d460b469542ef0740983297a4456f239a2ff3b990f1e3a1a3dc017e03d8c48d34d4ea0cddcae3495a014dda4fa82d5993fadb40fc87235370e8bb2ef68dae18ac056eeb2944eccbe89759c7e1f371ac605b28582ced18", 0xd1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) 13:40:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x17, 0x807, 0x100000001, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000140)={0x4, 0x4, 0x2, 0xfff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000002c0)=0x1) 13:40:13 executing program 5: r0 = socket$inet(0x10, 0x800000000003, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x100) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7, 0x4d, 0x2}, 0x7) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/176, &(0x7f0000000140)=0xb0) setxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x26a, &(0x7f0000000000)=[{&(0x7f0000000340)="2f0000001800030007fffd946fa283bc8020000000040005031d85680800a3a2d188737e0b00020000001389598e2c"}], 0x3c}, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'ipvs\x00'}, &(0x7f0000000300)=0x1e) [ 288.241549] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 288.330996] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x4cc1, 0x100000001}, 0x2c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)='net/tcp6\x00') ioctl$EXT4_IOC_SHUTDOWN(r0, 0x8004587d, &(0x7f0000000000)=0x1) 13:40:13 executing program 0: clone(0x2102041ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x0, 0x440000) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x42400) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000080)={0x7f, 0x5}) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x1) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000280)=0x1000) write$P9_RATTACH(r3, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x22, 0x0, 0x7}}, 0x14) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) memfd_create(&(0x7f00000002c0)='\x00', 0x3) pipe2$9p(&(0x7f0000000240), 0x80000) ioctl$NBD_SET_SOCK(r2, 0xab00, r4) 13:40:13 executing program 7: r0 = dup(0xffffffffffffffff) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/23, 0x17) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x5, 0x103000) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) 13:40:13 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:13 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_AIE_OFF(r0, 0x7002) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000000c0)={'bridge0\x00', {0x2, 0x4e23, @multicast1}}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x6, 0x12, 0x10, 0x10, "3579646b0f1cacefd570b1d1cb6e9d402f51a56d6fe5592e8a472071c82f4a933f8f0b40faebe7919feb8083b446b01d97290efd5e5eed0d9f37b99eaeed29ec", "30fd0d5ee9d5701d48d215137c604bea98ae8258bc251a7e3c89cb7468f21bdd", [0xd3, 0x66f]}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf4, r4, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4fd}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x140000000}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2b}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x810) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@loopback, @remote, @remote, 0x7, 0x8000, 0x1, 0x400, 0x1, 0x84000002, r1}) [ 288.824279] kernel msg: ebtables bug: please report to author: entries_size too small [ 288.875785] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 288.889823] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:13 executing program 0: capset(&(0x7f00000001c0)={0x20080522}, &(0x7f0000000200)) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x3ddc, 0x2}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e23, @multicast2}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r3, 0x1f}, &(0x7f0000000280)=0x3) writev(r0, &(0x7f000051c000)=[{&(0x7f0000000480)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x11e}], 0x1) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) [ 288.918291] kernel msg: ebtables bug: please report to author: entries_size too small [ 288.946941] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:14 executing program 3: r0 = epoll_create(0x101) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) close(0xffffffffffffffff) 13:40:14 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f00000000c0)=0x4447bd6b) r3 = socket(0xa, 0x1, 0x0) fchmod(r2, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:14 executing program 5: socketpair$unix(0x1, 0x400000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x801, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000040)) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r1, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000080)={0x3, 0x7}) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000100)=""/126) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000280)={0x0, 0x0, 0x1000}) 13:40:14 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c56") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 289.238249] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:14 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1000, 0x200) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x40, 0x1, 0x1ffe0, 0x3, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x5}, 0x8) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x4}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200008c0], 0x0, &(0x7f0000000200), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth0_to_bond\x00', 'veth0_to_team\x00', 'team0\x00', 'ip6tnl0\x00', @random="332ba8a637a5", [], @broadcast, [], 0x70, 0x70, 0xe8}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x3000, 0x0, "a635501f760dbbcc40ed47ab1f7cfc92126f3aea60227ac7e55b962553c6c6cac2328d67f4c4fea332686396eac43e47551c45ddc3b37c7958d3ef9a0af53ea3"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1f0) [ 289.278098] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:14 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) clone(0x100000, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:14 executing program 3: symlink(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)='./file1\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x20000000) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00', 0x2) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100), 0x4) [ 289.415981] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:14 executing program 7: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x10000, 0x0) dup(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:14 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0x7) [ 289.592831] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:14 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000fe3)="441f0801000000009727c1c6fe36cef3e26def21000200000011000013", 0x1d) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)=""/7, &(0x7f0000000040)=0x7) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x43ae1fea, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x4e21, @local}, 0x80, 0x1000, 0x7ff, 0x7, 0x3, &(0x7f0000000080)='veth0_to_bridge\x00', 0x5796, 0x191, 0x81}) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000140)="a17b492e01bab94ab24c42ca20dcdc39c7ea20c8a8aec7f37a0e56808a00361ff705d7011216df82f412361a5ae18acb8d6c148307f0ffe67ed6d42d917c45148f9d67e41414c05994bfc8095eff22bd4fb20b9a42a01d925db84b6ff7c94caa38ab1d4dfaab4d58e46714590b5a9ca81ccf", 0x72) 13:40:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:14 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x202480) dup(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0)=0x8, 0x4) 13:40:14 executing program 3: mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x840d415ea2107836, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r0, 0x4, 0x10000000006810) pread64(r0, &(0x7f0000003c00)=""/4096, 0x20004c00, 0x0) fsetxattr(r0, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a", 0x3c, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1, 0x2e) 13:40:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:14 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0xd5}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xd9}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x4) tee(r1, r1, 0x400000000008, 0xb) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) [ 289.919178] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 289.950185] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:15 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', 'filter\x00'}, &(0x7f0000000140)='*\x00', 0xfffffffffffffcbf, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x2000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000100)=0x3, 0x8) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 290.002535] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc807003a5f85715070c773ca0a3a5ddcbb1c694c12f83c91b606c570434bd2b76ff64d892e75846700010000eb51804335") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x8001, 0x6, 0x0, 'queue0\x00', 0x2}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x80000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000005900)=0x14, 0x0) r3 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, r3) madvise(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 13:40:15 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:15 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b38000)=0x3c) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) socketpair$unix(0x1, 0x200000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fstatfs(r1, &(0x7f0000000000)=""/64) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x13) 13:40:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 290.259154] kernel msg: ebtables bug: please report to author: entries_size too small [ 290.274937] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:15 executing program 4: r0 = dup(0xffffffffffffffff) r1 = socket$inet(0x2, 0x805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000180)="e0", 0x1}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="20000000000000008400000002000000040000000001000007000000", @ANYRES32=0x0], 0x88}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'dummy0\x00', 0x200}) chown(&(0x7f0000000100)='./file0\x00', r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r5 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) 13:40:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a21") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 290.374841] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc807003a5f85715070c773ca0a3a5ddcbb1c694c12f83c91b606c570434bd2b76ff64d892e75846700010000eb51804335") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x8001, 0x6, 0x0, 'queue0\x00', 0x2}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x80000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000005900)=0x14, 0x0) r3 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, r3) madvise(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 290.464818] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 290.485748] kernel msg: ebtables bug: please report to author: entries_size too small [ 290.505061] kernel msg: ebtables bug: please report to author: entries_size too small [ 290.554899] kernel msg: ebtables bug: please report to author: entries_size too small [ 290.583104] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:17 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0x7) 13:40:17 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000140)="be862ed9", 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r3) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x8) sendto$inet6(r3, &(0x7f0000000040), 0x24, 0x0, &(0x7f0000000080)={0xa, 0x8906, 0x3, @dev}, 0x16) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setgid(r2) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x800, 0x0) ioctl$TIOCNXCL(r3, 0x540d) epoll_create(0x5) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0x3eb) 13:40:17 executing program 4: r0 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000380)="c15aa61871fddf9534b77c69d73c2e7df15e1af917055ead592d80392a14c00986f122a667165687972702640eaf1123d9db6a300b747b7bb457244a1b79d43ded6ff782f1bc0a2e6803e157ffd0748f88c6c1ea37648cb17ee23a1cd973faa447724bcb1f797e2970acd423e2f7d3546373b3c26ea2e5e67baa52670ef3062e8287c360600b70a00f001a39b92896426dc1989cbc0f2e830327e2af1251ec43fb7aa9f3012c6ceb0389d80ec809c2770a7d5d39ada0d5ea6781809e76c9b83707eacfa43bfa53780b52ca3fcfbbeafe893f470d381aaa", 0xd7, 0xfffffffffffffffe) r1 = add_key(&(0x7f00000002c0)='id_legacy\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0)="d0cbd91d4a6cb41cb98474f2e9c953a916d3f7a01bee9c78941f6e1d7562381dceb1c4621691aa405bc09b615addba9d561502fb02f42de35a02b940bbe7597c655d3c6ca2db48fe9996ca7b72631e786798b0b1c413a4922f23e361156512d34508f4399f735feea2a05f9dc00ca3199e5833618637538c9b9402f56e1bc6bec457ead47ddfc06f81ef7bdcb4d1909158b857e2deb399b51cc0a344f54bb9", 0x9f, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x1, r1) r2 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = semget$private(0x0, 0x0, 0x80) semctl$SETVAL(r5, 0x3, 0x10, &(0x7f0000000200)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f00000001c0)={'syz_tun\x00', 0x2028}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) fchown(r4, r6, r7) ioctl$KDDISABIO(r2, 0x4b37) r8 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r3]}, 0x8c) 13:40:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r1 = socket$inet6(0xa, 0x2001000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x918, 0xfffffffffffffff4) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 13:40:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:17 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) write(r2, &(0x7f00000000c0)="fa065d2709852f7538c9a2a9ef56830cbcca160455aa51", 0x17) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0xca05) [ 292.702387] kernel msg: ebtables bug: please report to author: entries_size too small [ 292.727515] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:17 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$TIOCEXCL(r0, 0x540c) [ 292.758293] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 292.769147] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x80) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:17 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000004c0)={{0x7, 0x0, 0x10001, 0x7, 'syz0\x00'}, 0x1, [0x9, 0x5, 0x875, 0x1, 0x6, 0x2, 0xffffffffffffff00, 0x3f, 0x8, 0x631, 0xfffffffffffffffb, 0x7fffffff, 0xffffffffffffffff, 0x5, 0x3f, 0x2, 0xf1, 0x2, 0x7, 0x8, 0x4, 0x8, 0x0, 0x34, 0x3, 0x401, 0x4, 0x5, 0x81, 0x9, 0x7fff, 0x6, 0x5, 0x1, 0x81, 0x10001, 0x1ff, 0x2ddb, 0x3, 0x5, 0x80000001, 0x40, 0x5, 0x40, 0x1a, 0x0, 0x1, 0x81, 0xe74b, 0x8001, 0x8, 0x9, 0x400, 0x400, 0x5, 0x7ff, 0x7, 0xfffffffffffffff7, 0x883, 0xffffffffffff5f6c, 0x6, 0x9, 0x7fffffff, 0x33, 0x4, 0x0, 0x3, 0x9, 0x0, 0x100000001, 0x7fffffff, 0x8, 0x6, 0x800, 0x0, 0xfff, 0x8000, 0xffff, 0x20, 0x3, 0x6, 0x0, 0x8, 0x0, 0x7, 0x3, 0xffff, 0x6, 0xc1, 0x9, 0x60e, 0xb488, 0x9, 0x401, 0x3, 0x7ff, 0x7, 0xffffffff80000001, 0x10000, 0x2, 0x9, 0x8001, 0xa42, 0xa000000000, 0xfff, 0x300000000000000, 0x3ff, 0xffffffff7fffffff, 0x6aba, 0x8001, 0x80, 0x100000001, 0x100000000000, 0x10000, 0xad, 0x6, 0x1, 0xfffffffffffffffa, 0x3, 0x3, 0x7fff, 0x6, 0x10000, 0x1, 0x49, 0x800, 0x1, 0x9], {0x0, 0x989680}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:18 executing program 0: unshare(0x20400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UFFDIO_COPY(r0, 0x4008556c, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil}) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x8) [ 292.997294] kernel msg: ebtables bug: please report to author: entries_size too small [ 293.035298] kernel msg: ebtables bug: please report to author: entries_size too small [ 293.133982] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000100), 0x12, 0x3) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0x12}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x14, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x4}, 0x14) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000100)=ANY=[]}) close(r1) mincore(&(0x7f0000013000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/13) r3 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x80000) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000140)={'gretap0\x00', {0x2, 0x4e21, @loopback}}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x9, 0x7]}, 0x8) unshare(0x2d3366a1a0f3321f) setsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000040)="65bbe0d6422850186ad511322bdc379130c83a28324f789945956c5ca821412eca79e0deab865261dfa921cb5398044a43e68a", 0x33) 13:40:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:18 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f00000000c0)=""/105, &(0x7f0000000140)=0x69) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:18 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0), 0x483) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x1a013, r1, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x53, r0, 0x80000000) 13:40:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 293.409868] kernel msg: ebtables bug: please report to author: entries_size too small [ 293.422883] kernel msg: ebtables bug: please report to author: entries_size too small [ 293.450793] kernel msg: ebtables bug: please report to author: entries_size too small [ 293.466084] kernel msg: ebtables bug: please report to author: entries_size too small [ 293.534419] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:20 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0x7) 13:40:20 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) socket$inet6(0xa, 0x6, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x8, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32=r0, @ANYRES32=r2]]}, 0x80) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:20 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERROR(r0, &(0x7f00000000c0)={0x9, 0x7, 0x2}, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0x9, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:20 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x3, 0x10000000}) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f786") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 295.762917] kernel msg: ebtables bug: please report to author: entries_size too small [ 295.775393] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:20 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 295.835431] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 295.846386] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:20 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x95d7, 0x3}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r4, 0xffff, 0x30, 0x8001, 0x3}, &(0x7f0000000380)=0x18) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000140)="7b77b34d375fe29bc7d5d5a34724407e", 0x10) sendto$inet(r0, &(0x7f00000000c0)="7d133b67f94b0c76fb96ac2e9d19f107739b104a148bb78577a3", 0x1a, 0x8c4, &(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x456}, 0x10) syz_open_procfs(r5, &(0x7f00000003c0)='net\x00') getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) gettid() 13:40:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x6, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x401) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000100)={0x1, 0x7, [@broadcast, @empty, @remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @dev={[], 0xc}, @random="c875093b7382", @random="d4ba5468f7e0"]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 296.024990] kernel msg: ebtables bug: please report to author: entries_size too small [ 296.047318] kernel msg: ebtables bug: please report to author: entries_size too small [ 296.134123] kernel msg: ebtables bug: please report to author: entries_size too small [ 296.175404] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:21 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) 13:40:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1, 0x8000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0xc1, @mcast1, 0x8}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0xffffffffffff8000}, @in6={0xa, 0x4e24, 0x7, @local, 0xfff}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e24, @rand_addr=0x9}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e20, 0x3303, @remote, 0xe9}], 0xb0) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000201810000000000000000000000000000a8b070d40680a54f7f0ad09dea1946910333ccbb0483940400000000000000a15d15d1826363c4135c30d31fb1f67624216c6238dda5702dd529d0dd2f9f3d5ebaa74cb14d1f9d6cc86779df5b8c76693eab5366399ac2bcbb67c0bb0a74e7f6e3e2779798d50ba30745a0dcc9cb81911d27d2367a9c909c064d71a76a1c8aa2bd4610037792613ccc898757eea54a3ee516c5b086eb9597b49fa9bd3a2ac066f418d500000000"], 0xbc}}, 0x0) 13:40:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000340)) ioctl$KIOCSOUND(r0, 0xc0189436, 0x7fd) [ 296.266211] kernel msg: ebtables bug: please report to author: entries_size too small [ 296.281346] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 296.398282] kernel msg: ebtables bug: please report to author: entries_size too small [ 296.477898] kernel msg: ebtables bug: please report to author: entries_size too small [ 296.518509] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 296.660217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 13:40:23 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)=0x7) 13:40:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) listen(r0, 0x400) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000300)=0x5, 0x38f2ccd04da31a40) r3 = dup3(r1, r0, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000540)={0x0, 0xfb, 0x79, 0x1, 0x2, "eb12aa4a9bc996c652573615526c4192", "e5a17725b96779fa86dfc8af345cc9b4253893af9f304b72c100b84fb35ccb04e7410b7f6a05a6c782533f39358a064a1c6e9d4459cc43ab265806d7b159d3bb066be86e80de5badca2e6a2fc1ab3667cc6e1982b144fc63c58a9f26339c43c7245bce5c"}, 0x79, 0x3) ioctl$TIOCEXCL(r1, 0x540c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r6 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000004c0)="0ede34443379642217ec4a3be613fa5808a05ecfe5dbe07c2d16eae33dbf2fd1291e9a5cccf8c4da4c85592688af3e9132937f05a95ed3a05262d23a19a233bc5ccfd31ddccb25dd69aa2755", 0x4c, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000380)="38f240bcfbccb6b76cdcbeac55f7259f963b7590ac36708966e492b5550c75dc2ad4f0407d0768d2603e704057382610ac110f2645094180cd6cde4a0f84af8aecdc63aae96261439d7a606e6a37f329594c399cfd826a0a798615a3f0141d170b889be7cc5e56ecb9b9624daf3712fd2cb55423d5762b5389b2996bc3914c31c06bde4e2150df47eefe11baee86e777474e9a6fafcd6f7491c92331f0ae8d0e4afc57063ac1895e613e7331288bbcffd7e39d0980eb123c68c650017cf24fb78738bec892775b3b38bb20816635ebdfdc3ffaa56ca84f0c37379bf3eaabaa0504", 0xe1, r6) r7 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r4]}, 0x8c) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000000c0)) 13:40:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1ff, 0x400200) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xa9, @broadcast, 0x4e23, 0x1, 'sh\x00', 0x15, 0x6, 0x42}, 0x2c) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)={0x8, 0x4, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4003fc) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000340)) ioctl$KIOCSOUND(r0, 0xc0189436, 0x7fd) 13:40:23 executing program 4: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x10, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000940), &(0x7f00000008c0)=ANY=[@ANYRES64=r1, @ANYRES64]}, 0x88) 13:40:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1, 0x8000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0xc1, @mcast1, 0x8}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0xffffffffffff8000}, @in6={0xa, 0x4e24, 0x7, @local, 0xfff}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e24, @rand_addr=0x9}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e20, 0x3303, @remote, 0xe9}], 0xb0) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000201810000000000000000000000000000a8b070d40680a54f7f0ad09dea1946910333ccbb0483940400000000000000a15d15d1826363c4135c30d31fb1f67624216c6238dda5702dd529d0dd2f9f3d5ebaa74cb14d1f9d6cc86779df5b8c76693eab5366399ac2bcbb67c0bb0a74e7f6e3e2779798d50ba30745a0dcc9cb81911d27d2367a9c909c064d71a76a1c8aa2bd4610037792613ccc898757eea54a3ee516c5b086eb9597b49fa9bd3a2ac066f418d500000000"], 0xbc}}, 0x0) 13:40:23 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e24, @local}, 0x10) 13:40:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000340)) ioctl$KIOCSOUND(r0, 0xc0189436, 0x7fd) 13:40:24 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockname$packet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 298.941266] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 298.961119] kernel msg: ebtables bug: please report to author: entries_size too small [ 299.029603] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000340)) ioctl$KIOCSOUND(r0, 0xc0189436, 0x7fd) 13:40:24 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000c00)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000001340)=@ipmr_delroute={0x1030, 0x19, 0x100, 0x70bd2d, 0x25dfdbfe, {0x80, 0x0, 0x80, 0x80000001, 0xedfbdd331769cbd6, 0x5, 0x0, 0x7, 0x400}, [@RTA_SRC={0x8, 0x2, @loopback}, @RTA_METRICS={0x1004, 0x8, "876980178b91d990eb1c881a3a65f4e69e512e34abe57978ad56f2c781ad70a4f5cbd09f5bc33903f9f09872164b205960b5be3fe20fed9392dbdae394c6b41a7d377d73d65972973a6e3dc700a71d834dc0bc45c48be556dd9ed7f4133c7dbaf0aac4404ada2f5dd1b34ec531b488d9b01721e2d58d2fa46b56cadf6e7e16a54ce4edf9eaf0bdca46b59cfc01c3c339077cf9300ce102ed92d67a4de5fd1110cd1e92cda90cfaba04ab32c9137a8d72d78acfd5cdd97840062d89200eb7dad1739070a45cc6dde688981830ea7df27b8b1977f92f06744a3642f1ed9b8ef936c3a329d68d7483f0946ef7e299d78a9e133e1a0a9f9e4d312808c4c0b70a20518a5211c13e6c6ae9015a69c6c3e98cdc33907c972bca8046bc2eaaf7f14757867d06787623d0e2622406c3e7b60e5641d2aacd2c12618081fc4710ac110a6ff88cee807c8adfa340091ee334b98213790dabeb205114b9370ef56a7a9137e81e410965b4528d43cad4791a935b8003c61e268eec297c204f491b7bbec021f659a982520c684bdd2f16978cdf35b65cacf3a85839e59b880de11c57bc555ff6802d01a71c1b5ebb145d0af4c5a1409892de5f760048ba7a3ea4f83c631845cf2e15676b463ccaee7ac50d66236cd67422e4687bd71f7909e3c383ae2ae12309fde4f80720e640accaecfbc54e9ae06bd4fda852ad8b64862489c2f0d904dee75ebde02a7c881dbe29027466c77e9ac9c3c35ed46cb4f7e8875d44b5cc67f7cc4151dfd0aa3d9d43cdbbdba04b84febab9a37dba25b679721ab1748e79e88ee3544cd6c682217a9cb3636e7ef90dc655b671cccde57ff6fb5687f8b20b14ce2a9ae28ec277b22aa5a554970fa5df861e8670703e109acb05f020c7409b41cb25f991efc5e9b0637f1940e18e910ae07b560f68c1351c55df6f0af17a20a5ead1d9e3711b2f935733c37c1ee3586472e24340e9476ba700b499b235ff07021ffa893da29fc1da77174bf1f2be6d18a01f8046374941d46b6f59d090edd4a1837bc106d26165c7dc4350985f7fb0eda45d1179de291402e92d3ea06649aa4bacf038f39075fcb9861e8bcfbb8c04549150bee88db5f755005ec5578c95757e586c3d543402303291de71207574a04a5972585bc8d8ffb1b2e87910adc93bda7d347e5ccd544799396a0688a9572850722cf69267e166216eabc5bc272e36042d18e008828d0b52eae0fdb0f1be76f5a0aa5e2a5f25ee41327161d4ff8f01ec370d9b8ce9e761e07d2e2af7e3aef7aa980cf8a35f1cd84a30e47c61508da09b7ad9084590e54b15bf96e88eee2534a3b863df85cf916c434d8f41b8e69975904c91244ca69e99f8eaca8912cdc85a8706e519afcb8fc93efac761676cb17e8f0efac9039943b28db19b86f05c6f228bfe306f695f0b470050e9246cf01bd50fe3258a1320fa4472bdfd8b49942cebeae33ece986990beb734c5c3830c1fa54a24c0652654d4f2c2447a23d2bdaf024cf37b51a6cf0b21aa3c74a1f4cea056c35456575062e8bf405d7cd575d5fb641c45523227af7adfac205df4c979835c0638d0ead6bde36984e098ae3922efadd1cef1db3edcef41033b723d4166bd256dc2e2fb3efb09628b84002c3d754a13ffa7f0b018460e9dda5397df9f865d96858dec59ce6ae13e52e7e348eae04a9a66f1304ad41276654211161de041fa3a02ce53466d47464497e8f2e4d9c88b78fbaed201948ab73864fedbeb5052680a25adff760975b43f2cbd140743f5febc5e0b650932c4ce5f086c21a5776b7d150c5dd814e1858e9e9f331466434f487f47f12665745b8ca1452756b0c0499c2e0ae56d7c71382b6a36ce7fb7b5417a38456aa5069d6f95a85e329d4bb4c0925185c8b582230834d3feed8c0d01747e8dfb2065d0357977eaa86d9c1d3cbe8046100d7e45c29dab3466caab2daf567ed7ee57f6b9778cb4396ae2a5f03bce976d053d0b4510410d22d2e2ac92b3b606077fe01b3dc417fbbb1574fe10d907b1249134254d7e6c8ea8d6455a2089f7aeae09b2847ec0b0d002adfeac9f7018164ec87ed139cd621ec84f220ec60e9eb7efdbad2d7ea693358876084ac6e368ca78b009495eea7ceb97b59328d3ceff4912a232a5a3d5264eff6f113a7558d1969a363813aa9a170fe31f9e54b0949ca021ce703c5de372f2d2eb2e75cc4cdcc5d8cbd815720c12f4858c0fb0687d89a32435f0ff1c4800016964fd30e72367bf09474033a89fe021235af9b88ea824e21d50b6371fe12f4f3524e812f8fd1c498d7120ab79f130bee9a8a6f9e6b268a96b2a4edc16ae525b62682b8d2e3acffbc8fbaebd1d0e4b7e777de40678adead0e361818fb1151c63b75e4783a061540dca5bd6376ba0add63b18914974e6d46bcd6ae3674dfcf84c3ac83439239a0c53b5e6da9c5a3ba41a54e245ade6c25fc6e71dba5a1016bca32103c260502dccc424b2bea96b79b0f6c10c7735883b2d7bc920a0ba62a4f919c6eb4d72c8592c96cf9f8f8c740db764a0e753592455a36cfc8b6782e8bd107c52f535bb35f18ed7a3ef22b6aaa52ab68abbde124e95d855c1879ed9aafdc34b598468fa01bbe693c9d134670892fd402e27780573dd22231e15ac49656c6e402a8f7c9f2ffa263aef7b29ca18a570cdee68384e5548469c907f97861fd47ed20311fe57b92f4e97b45097cb4d4fdabd9131e8e24370b4084032a0b55a8ca4f4dca91b2fba38403c56ac1603b2ba49ef61a5ea548515e0e209eac1a66de517987fa9b5af8532661b7bdae9282aeaa72cb2047362e97a18e3410cdd9313e7f0de84378835e8b559cdcb2528006b5224de7603b054140733d44304cdfb6d83746b0b350b870f8fed520cfe45ed38ce32a1f00b456dfbbf07db9f81240d4c24deb9119f93f2ca3d6bf1347b5da04f4adbd8cc7403fccad4a87eb2501da05c3ddab32d9205a4f6b65f5105cad0fcc426e85b00ecad3bc90005f836fc76d83d2fe0fdb03f61ee5e4473bc59562857e37d7c525fc8e42c33cc9a47095fb786ae8b9742b91ddd059b320d1f6869950a9232c9045e12c167d442d273cca550b4144e5043218f62cf06aa30be4f806648553baec74ed662a9d7df1b5d8d0de336e4e1097e1449b7e351a15e6e532a963b989da3014026a29b61eddcd145cab600d77d450a95dd92a29cb975e1deefc9faa15f66685b683d00e3d3863d2e4cb4da1587b6db3cbe8751b66814fd2f193c399c1b59af839d7e7f6de4fababcf06593e9311b6d69244569080812bcc2791d7f49f13e339c574d79b52903530eefd66eb70ceefddc8ed553299698cd3070f989190c339cbfa4c88ee023322971a68432a1bd40af464e5f7594f696d498c588eae5f49381e40399864301b07048c1d91115f4face479484191ec2a33d372b16622bd94221fd97302c9a7487cfa606434007557d2388c70dc222bad69c44010c5946118e7f6b9a95d5ac28ce4fd3fccaccb5c37bd856ca7591a3fe190ad9b6d7fcdb55aff8e74c980d2b983defedebb0b50f166fa7123f7d5ccab0859122dd95044fb13ad73c7dc0d61351c1b6137fa52487455343127798f8392310dce9455067945f77178026120c66964a1de8f1c0aa1eb4b3d959394c03b2d4ff7594a518907d915ece71dd872ee320eb53c89f0d31663acfc36a248d352e0ff6cf7837ef41c1dbea65018de3ea5a5c6adcd2fd6c670c8e773ed1cb2cd71dcd753f27b793bd01d45e30bb8cbc5b349cd13656bcd3d50fc4aea52077f663c4aff3e5eba561295bf1ccc6434b904eeec740568e54cb739f068c70b4033c26e2f9c58d9976020767f0b07e0f3502d7c228b30d98bbd94988260e3ebecc89f31a1fe428a6fc54ae493115dba13af7a95e3e45236a913d858873986815c551333f39b7a55883f543e8d91acebad4a6519f9d2351367291a952a0f45c679e4cc681440f103779c8fa5f360da219742070d754819de9cd7b35489edd8b61380964aec5049e477e2c5847c2b6f4fffbd4aef18ea5453f4ba5ef0dc39cf3ac047f24e75801ca43929aaf90cca22b2ba7257008b44c251c2c1204c977b6272389de99526f599af50f370982663efbdb504a99bc1888322f8d4a7dee1c41c85500f5c463465893af733b1cc64ef74afc6df1ab8dc80202d4c214193549eea954199fbae4869470c788dee580d3a34c147c911d4a152237331ea9a4c5a7a0f7cc6faa97cd59fc4cd220a6bf3e1ba7f2425853cdf5cb902ce97f0d69a243005d6f2554156b027c7c4e80f3695ecb95960046f1eca7c7085dac9cc3fd9865fca396c796c90c753a685343ccd7bbe11f60f7fd74f9ee4f93e20d01467dbddb0f636d8f06c46ef15e5a54c1ca578af896c5d8f94535fcecb5f289f8333c6eb769c9337c579f5f7620c822d54ff4a1479ad8706cdb9375a80f1549e8b622f5e410b4a2c4a05e941991366a6d93a763408e374d359645309d8d418cb6b956be363f97352854fd6ebb8d1dd8481dc80f4debb3a5dc2ed9e54f9a2133bda5a2569611626e89a31fba84987b39c403d5f41faff0363803fa164f63676e33efea73f71274174054afebc0544aeec7dbaa7824d75b8389cbdf339e8f5208a5f6b583ecc0c86a39bc187de8b07cd24ba8685a6f0a44a8007442dcac580ad11af49370eb3b49993d6cd4e66d55a2d3aea32aee49e40cd9999e59f1c082d2232c8c54fdca20de2c80f08e18d37739df61b08fafd3b6b09e64396402b414c9eb914653ca2260ac8a2a2c856fb3910e757f3b1c158986239ddacef63d83c8563bb37fa29496a40277bd335cd785b9468f11e2155802862929c33577b215b67b04e6a2dc4541ccf0705799440a343bd5c0b80e0118742a3f9209d6458c1301cd687d372a8bab4097b725011632e619ddb3ce6c356ff8c23d0a93faacd407a9b5a74cc8cc4cab46d27915d1566970e95976a53d7251b2f3eec462da10c773f283d83944cac7b9ec2c5c794d2f258c323fc644c1bd037b36bd365be449e07fea853ee664ddb249195e5e47bb58c9711c1f92b0ff7466133750c62b5ab7e908a488c07d5368d18e40b17c83306bb2ee0c55f3caecca6fa5bd6236804de659a90061b9eccb53d3b03026d6f37aa4667f31624adefaa51e5fb861f27c16d44d78103eaa397cd481122d1ceb33a4db6c77eb1b99078b3a83b4f69bffebb622ac6a68c747d58f9ff06866f4b92f87a36811700a3ccf3d2cd4dc06a4e9b58d9530bf27c4cdf4f57db9823d5dbceaa935bcacdc23a2b872d9722684b10393b977bf41fc62c56af062197fad6401aaf18ec5653e14223bf32c0ddae39407105a01f3f7b2750f2ffcfba891492816195f48cc5490cacbf5015417b26d92098a53327ebfad66fc6ce6185315dda546d97b9fcd79fb244a42bb58fd613a50966141d1a82dd88b53819a736c78874e901bda45773e5393509c27cb8ca9eac43a4763640a424115fae97f6fb6306d279bf298cace0a25d3ac615525c3ddf5d8274a365750bf89027c3e716a9059a9529e5f50fc41a21ae4ec4d646b1d661e06b6898d969bef4a0f48265b8905a392231bf079cff524a44728f8653f73a7190458f2938a577cda5c9c8323074f358891cf163bfc49c2ce9c4309100b063fa6da388ae0e7b8850317d7225a076f1628fc6f37ef90fc78878b74a87f4965a0a8d6283621a4a47ce143fbc418396ed9ca53eca15464362fcc722e1d30156fd2d0dc32ed5eec5ccd22f94803208c00584924b80aa18519989d613469a25511"}, @RTA_GATEWAY={0x8, 0x5, @rand_addr=0x1}]}, 0x1030}, 0x1, 0x0, 0x0, 0x44040}, 0x0) r5 = dup2(r2, r3) ioctl$UI_END_FF_UPLOAD(r5, 0x406855c9, &(0x7f0000000b40)={0xa, 0x0, {0x57, 0x3, 0x4, {0x6, 0xfffffffffffffffb}, {0x8, 0x8}, @cond=[{0x4b, 0x75, 0x6, 0x180000000000000, 0x1, 0x1}, {0x1, 0x6, 0x0, 0x100000001, 0x1ff, 0xd4}]}, {0x57, 0x53fc, 0x20, {0x100000001, 0x81}, {0x5c8, 0x2}, @ramp={0x1, 0x3, {0x100000000, 0xfff, 0x80000000, 0x8}}}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000bc0)=0xe8) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) sendmsg$nl_netfilter(r5, &(0x7f0000000b00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000580)={0x530, 0x1, 0x8, 0x400, 0x70bd2b, 0x25dfdbfd, {0x5, 0x0, 0x3}, [@generic="7341ef30aa40ea8c9c10e187a141c9824632d651d80fee1d9511e5288dfdf333ba7c82178a728891c46442005213b4bffee155818defb788a8f21d", @nested={0x10c, 0x28, [@generic="75ab3ee3b40783d400b813becc99de90d9df80848f3013f6b0c91c69087833df52133c47b238dec084028c3950305fea4b922d4015d05a481488efb5384f6452360816ed160aa58747db8deb38110b342bbaaa18fdd7273d6baf9168a52d2f1cd1a4853a60801fd9316bba171064c3ff9eb950d07abd74842d711ca8352b1c8782d0b7e395c1ea5d36b07bb6b20f9c08e573b4b9bb4088533b0fb6855fe93bb7784fb7a15985cb5bb86c91cfe2094859f44d7a16a9336084fa1f57c09b86ad3c2e5e104a6b68e6b05a37d31222d78362a8b4e9cc411d934ec7c3f478aa4568ba26adeb75", @typed={0x8, 0x7e, @uid=r6}, @typed={0x1c, 0x19, @str='cpuset,*vmnet0#wlan1@\x00'}]}, @nested={0x64, 0xb, [@typed={0x8, 0x1, @uid=r7}, @typed={0xc, 0x5d, @binary="949a982b106bda"}, @generic="4e67ab0432d15f951a75dac1bc99a3228242af1ff25e2be9a7cc4e8d27bf9d71dfe3", @typed={0x4, 0x55}, @typed={0x8, 0x13, @fd=r0}, @typed={0x8, 0x5e, @pid=r8}, @generic="d8d764bfab81a587fa95169b1fc059646887be"]}, @nested={0x364, 0x53, [@typed={0x14, 0x4, @str="766574000000000000000000bd6800"}, @generic="7ee3e0c0a5d6bd4c8a9c9d369311bb206b276db59858d5cce1d5d4d0638ed1ef587d5e685a0cf40cdfc921357e715cce19eb85069e41098bcc506a89b84d81b64e0452c6856fb6c20322976b2c94101251424d5709b86e00939273ba20fa0e81d7c085af01d62e538c1267e6a7ad9c5e455fddf9d86d577a342683c5b0ccb2762992ab8b140a2a3b64a97ad297c5ad8edcda8844875b562db9bf407a839774dbfadc4ef6e9d3816c8d414d3374fc43efe1d77cdcf7ecd6311939bfd6ba5f47d796567288e9e9f8760d6d215cc6882f5e29a22689d1ce6e892b68ff71d8b8375c78cd", @typed={0x14, 0x3, @ipv6=@mcast2}, @generic="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", @typed={0x14, 0x5b, @ipv6=@remote}, @generic="677d3a65a32f490ce9475439d568b198f333769a77e9ca4d145622a00c519a45201e1ff379071f853eba3ba48de9d6eefb538a57125f3f2729af5d50707806ee6cb0f571742c05f109372f826c69779b4fd1b3d0ab274edb25681ee3ee6da725661d42db68b85fb25ed29ea12e18620d86e7a21e25f15e87c4261a03c84b9968fa04048c667bf5f1295f5529f7aef36cb44b636f63d0a08339a75b767e52f516c8a6565445d836e5cadd8f9cda03ff8a42ad04afbf01ecb011007b7190c41e3814dbec80d88863a064cbf044cbe8fa8946e3f20a999b91986c2dc8b7b008e077fac1e650b9d4b1b41beeb3edfed0da6bea2d0c7ba4ec8f", @generic="a863024defd9cfd8bdf57cce28ee6c2a50410cd6d9c7449af136a892112089c53e40100782ea58caeed5e14e8020bf9d3f0c99825e07677de5a722d730c1acc88b091317143fee", @typed={0x8, 0x11, @ipv4=@multicast1}]}, @typed={0xc, 0x71, @u64=0x2}]}, 0x530}, 0x1, 0x0, 0x0, 0x4000010}, 0xcb5dc606e2e633ad) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000001300)) [ 299.108014] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:24 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x40000) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000280)={0x80000001, 0x8, 0x5}, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x408}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e23, 0x2, @empty, 0x80000000}}}, &(0x7f0000000200)=0x84) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000380)={{0x8, 0xf2, 0x4, 0x100}, 'syz0\x00', 0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) flock(r1, 0xb) 13:40:24 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@mangle={'mangle\x00', 0x1f, 0x6, 0x758, 0x598, 0x0, 0x598, 0x370, 0x370, 0x688, 0x688, 0x688, 0x688, 0x688, 0x6, &(0x7f0000000100), {[{{@uncond, 0x0, 0x158, 0x280, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3a, 0xa39, 0x3f, 0x1, 0x62d, @mcast2, @local, @loopback, [0xffffffff, 0xffffff00, 0x0, 0xffffffff], [0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff], [0x0, 0x0, 0xff000000, 0xffffff00], 0x2000, 0x3004}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x3, 'system_u:object_r:run_init_exec_t:s0\x00'}}}, {{@ipv6={@mcast1, @mcast1, [0xffffff00, 0xffffffff, 0xffffff00, 0xffffffff], [0x0, 0xffffff00, 0xffffff00, 0xff000000], 'vlan0\x00', 'team0\x00', {}, {0xff}, 0x7e, 0x2, 0x2943f460e2cfba3c}, 0x0, 0xc8, 0xf0}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x5, 0x4}}}, {{@ipv6={@loopback, @empty, [0xffffffff, 0x0, 0xff, 0xffffff00], [0xff, 0xffffff00, 0x0, 0xff], 'team_slave_1\x00', 'veth0\x00', {0xff}, {0xff}, 0x89, 0x80, 0x1, 0x10}, 0x0, 0xc8, 0xf0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2b}}}, {{@ipv6={@empty, @remote, [0x0, 0xffffffff, 0xffffff00, 0xff], [0xff, 0xffffffff, 0x0, 0xffffffff], 'ip_vti0\x00', 'veth0\x00', {0xff}, {}, 0x0, 0x1, 0x4, 0x8}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xe}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@local, @ipv6=@remote, 0xf, 0x7, 0x7}}}, {{@ipv6={@ipv4={[], [], @loopback}, @dev={0xfe, 0x80, [], 0x1a}, [0xffffffff, 0xff000000, 0xff000000, 0xffffff00], [0xff, 0xff, 0x0, 0xff000000], 'ip6tnl0\x00', 'ipddp0\x00', {}, {}, 0x33, 0x1, 0x7, 0x3}, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0xd1a}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7b8) clone(0x1100000, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) prctl$setendian(0x14, 0x2) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f00000000c0), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80, 0x200201) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) 13:40:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240), 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 299.184214] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 299.366563] kernel msg: ebtables bug: please report to author: entries_size too small [ 299.387971] kernel msg: ebtables bug: please report to author: entries_size too small [ 299.444097] kernel msg: ebtables bug: please report to author: entries_size too small [ 299.445730] kernel msg: ebtables bug: please report to author: entries_size too small [ 299.560895] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 299.649519] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:26 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) 13:40:26 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000140)={0x0, r1}) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000000)="153d6e18b5f26f158608d1c7f51fccdd1f42d269c8db4e7e77f5372c86996165e7b82bde8cc3c5bc0631552ee5cb3cb10bd72f52fc170b58e1b397422740f5d67d32a9798ed1684e060f2440eb92cbce8eb877e7141b4ee11339cbe2cfce778703a77d54eacaf466c88d4997a43b852fee784e80b575605c76e948c6aba22b30f3079ddb1d68e6e6407d7af6d39b4a221f0d79e13bcaf41c3c11c0f0097e0803c8268bfd91a4f614afc71e082c325725d2bd804f9d80cec007025cbcbe82f2c1372c1ba9c4fa4569252c886b") ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000340)={0x0, 0x7}) splice(r1, &(0x7f00000001c0)=0xfffffffffffffffc, r2, 0x0, 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000240)={0x1, 0x4, 0x401}) 13:40:26 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0x8c, 0xf, 0x7) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) recvmmsg(r1, &(0x7f0000001e00)=[{{&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001840)=[{&(0x7f00000001c0)=""/36, 0x24}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/91, 0x5b}, {&(0x7f0000000280)=""/168, 0xa8}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)}, {&(0x7f00000014c0)=""/240, 0xf0}, {&(0x7f00000015c0)=""/156, 0x9c}, {&(0x7f0000001680)=""/152, 0x98}, {&(0x7f0000001740)=""/241, 0xf1}], 0xa, 0x0, 0x0, 0x6}, 0x8}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001900)=""/84, 0x54}, {&(0x7f0000001980)=""/240, 0xf0}, {&(0x7f0000001a80)=""/233, 0xe9}, {&(0x7f0000000440)=""/31, 0x1f}, {&(0x7f0000001b80)=""/128, 0x80}, {&(0x7f0000001c00)=""/243, 0xf3}], 0x6, &(0x7f0000001d80)=""/125, 0x7d, 0x8}, 0x3}], 0x2, 0x0, &(0x7f0000001e80)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:40:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 13:40:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:26 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000280)=""/186, 0xba}, {&(0x7f0000000340)=""/110, 0x6e}, {&(0x7f00000003c0)=""/119, 0x77}, {&(0x7f0000000440)=""/186, 0xba}, {&(0x7f0000000500)=""/12, 0xc}], 0x5, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) getpeername$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x288000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@ipmr_delroute={0x60, 0x19, 0x10, 0x70bd25, 0x25dfdbfb, {0x80, 0xb4, 0x0, 0x7, 0xfe, 0x6, 0xff, 0x5, 0x400}, [@RTA_MULTIPATH={0xc, 0x9, {0x8, 0x2, 0x10000, r4}}, @RTA_FLOW={0x8, 0xb, 0x2}, @RTA_MARK={0x8, 0x10, 0xffffffffffffffff}, @RTA_SRC={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x17}}, @RTA_FLOW={0x8, 0xb, 0x7ff}, @RTA_GATEWAY={0x8, 0x5, @local}, @RTA_ENCAP_TYPE={0x8}, @RTA_MARK={0x8, 0x10, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x8800) 13:40:26 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000380)={@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x0, 0x2, 0x1, {0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x10}, 0x6b5}}}, {&(0x7f00000000c0)=""/147, 0x93}, &(0x7f0000000180), 0x14}, 0xa0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) fcntl$setlease(r3, 0x400, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fadvise64(r0, 0x0, 0xffff, 0x4) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0x6, 0x4) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xc) 13:40:27 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) [ 302.069275] kernel msg: ebtables bug: please report to author: entries_size too small [ 302.082531] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705fd2643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000680), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x139f) socket$inet6(0xa, 0x0, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000ff0f000000020000000000004000000000000000fff4000000000000010000000000000000000000000000000000000000000000000000000000000020000000df570000fffeffffffffffff730000000000000003000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) read$FUSE(r0, &(0x7f0000002000), 0x10165) write$FUSE_OPEN(r0, &(0x7f0000000640)={0x20, 0x0, 0x3}, 0x20) setuid(r1) ioctl(r2, 0x0, &(0x7f0000000b40)) write$FUSE_OPEN(r0, &(0x7f0000000200)={0x20, 0x0, 0x4}, 0x20) [ 302.185652] kernel msg: ebtables bug: please report to author: entries_size too small [ 302.210312] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:27 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x80000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000180)="49a76acfcdcc33143741b5b6d2aa8c2cf08e3518ece0b479f9d8277fb185e8fe9ee5d4356b06413d0996b8", 0x2}, 0x20) chroot(&(0x7f0000000080)='./file0\x00') epoll_wait(r1, &(0x7f0000000000)=[{}], 0x30c, 0x4774) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x2000}) 13:40:27 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 302.255265] kernel msg: ebtables bug: please report to author: entries_size too small [ 302.330947] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:27 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000000c0)={'ip6gre0\x00', 0xfc4}) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) prctl$void(0x3f) 13:40:27 executing program 6 (fault-call:20 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 302.420001] kernel msg: ebtables bug: please report to author: entries_size too small [ 302.503369] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:27 executing program 7: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0xffffffffffffffff, 0x3, 0x400, 0x3, 0x7}, 0x31, 0xf2}) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x0, 0x4, [0x80, 0x20, 0x7f, 0xead4]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r5, 0xfffffffffffff318}, &(0x7f0000000380)=0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x100000000, 0x4) [ 302.577869] kernel msg: ebtables bug: please report to author: entries_size too small [ 302.665542] kernel msg: ebtables bug: please report to author: entries_size too small [ 302.758460] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 302.827468] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:30 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) 13:40:30 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x3, &(0x7f0000000200)=[{0x2, 0x1, 0xfff, 0x669}, {0x0, 0xffffffffffffffff, 0xffff, 0x100}, {0x20, 0x8001, 0x2, 0x4}]}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) r3 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x101, 0x303000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000300)='./file0\x00', r3}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={0x0, 0x400}, &(0x7f0000000440)=0xffffffee) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)={r4, 0x6, 0x800000000000018c}, &(0x7f0000000100)=0xffffffffffffffcb) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={r5, 0x46, "bb7ae927e33cabac77690d4f60758f60b6bc27dbab5f7a4f6f234f16d19d0df5fc704931591bcccd21daec30ca77c1adf1e2c4722c5896a12780b8aedd9786cc220b2169dfa0"}, &(0x7f00000001c0)=0x4e) 13:40:30 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) socketpair$inet6(0xa, 0x80000, 0x16d9, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140)=0x3ff, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000400)=@in={0x2, 0x4e21, @local}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000007000000890704000000000074edb408dea049b9c80bd0eb14d03805938e9a13761d4585f880acbee3868a40ec2a6188d28fe100000000000097c66ac1038988357bd147b617d817787eb7d1724feb5989f6b9cbee33260996f071d28baf6e75a64c0cc1692ce11a2ab1956cdcd815dad5823e1339d0f31301ad4e1286eaa76d1e1e4f9aa769a1c2dc906f85b6cf0b15c5c8c555baff2170494a6037456fa0f845961a94b2953b"], 0x18, 0x400000000000}, 0x804) 13:40:30 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000000c0)={0x80000000, 0x200, 0x49, 0x9f}, 0x8) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000100)={0x5fb472b8, 0xb404, 0x1}) 13:40:30 executing program 0: writev(0xffffffffffffffff, &(0x7f00000007c0), 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000300)) r0 = socket$inet(0x10, 0x3, 0xc) socket(0x0, 0x800, 0x6) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000000107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 13:40:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8fb00f77691567fac148932520fd6157dd631ae2309059736e37d00000000000000000000000000000000172c5b0d5c1e4e4ae1f8404335e86741fea52288e682381c156b96df8b3e7729f8d2ce9497ef1969475882a8de647f20a2339f241e01ab7e9586beb339b4f148039519abfc96b973e23f6d5a160f6cbb4898955827994bc1868a461bc7e57b91521ac174a4f1bdf8e836129af475fa05e229ce2afe041c4f1b2e81e16177715c3fbf77ca538803977464ae22b90375f888245eb42fb753942169e13bdaf295"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:30 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000100)=0xffffffffffffffc0, &(0x7f0000000140)=0x1) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000000c0)=0xc) 13:40:30 executing program 2: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) lseek(r0, 0x0, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) readv(r3, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r3, r2, 0x400000000008, 0x0) tee(r1, r4, 0x6, 0xa) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) [ 305.220577] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 305.234559] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:30 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 305.265473] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. [ 305.282319] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 305.321616] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 305.334193] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. 13:40:30 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0), 0x4) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000440), &(0x7f0000000380)=ANY=[]}, 0x78) 13:40:30 executing program 3: unshare(0x20400) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4122, &(0x7f0000000080)) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x3f}}, 0x18) [ 305.403904] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:30 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x30502) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendto$packet(r0, &(0x7f00000000c0)="54d5773569dad5b95d3cee9d41b38d03a8f7015ed53fb2afc522edc6b9363e6872c7ac1d2aa2a4dc5e1b17a0f17d380388799cc73741ee020587c1b7ed81d8a3a084cad50ffe2bf9f1ef9518a877ed7e7fe69675c73cbd3fea916249cf", 0x5d, 0x20008000, &(0x7f0000000180)={0x11, 0x8, r3, 0x1, 0x5, 0x6, @broadcast}, 0x14) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000002c0)=0xc) [ 305.481151] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:30 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000100), 0x331) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x46100, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000040)={{0xff, @loopback, 0x4e20, 0x2, 'rr\x00', 0x10, 0x13, 0x21}, {@multicast1, 0x4e22, 0x2003, 0x213c, 0x100000001, 0x10000}}, 0x44) connect$netlink(r1, &(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x1000}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r1, @ANYRESDEC=r0, @ANYBLOB="b5adbacb78a748b9181333b5cceadb496ad0f881094cd586d096457df523804139702d45e97eb15b0368a0de43fde3191e017454bc20fcf1df9a53643f858a4fb53bbf06e3b2227462423e149e48fdcf09ce5a4e98daa8a0da12978fe0964ab8def4396dd50e6ee139cf366cd3dfe88949cbfdb3d26aa58b3e44f7464f04ab0d71c7b12dd160535ad92251a618b0ebe5496f57502eb7830637b8da5bb0f2432ec8a615f95c1984c995fdf3934fbedae0824356d1c87558281ebe6c4202a8c43a48a7f9ac3bfb331925ecff8a295c964ecc4c8cc735d78499800b316e7d11428cd2e02a3abf50"]], 0x1) sendmsg(r0, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local, 0x7}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1, &(0x7f0000000900)}, 0x45) 13:40:30 executing program 4: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000100)={@empty, 0x0}, &(0x7f0000000140)=0x14) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000240)={0x6, 0x4, 0x2b, @local, 'rose0\x00'}) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_addrs=@can={0x1d, r1}}) r2 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[]}, 0x78) [ 305.562169] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:30 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x40, 0x404000) r1 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7, 0x101300) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1000000000008) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) ptrace$peekuser(0x3, r4, 0x42a6) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='filter\x00') setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000140)=0xfffffffffffffddc) 13:40:30 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) 13:40:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30ff3c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d5847039050000000000000008efcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520f96157dd631ae2309059736e37d005ca61103102939ece8c0068ffddba2abfc85ce2f29a2fa1c7fbf5f3cb365e8a6b2a092da507481a9ecb927b668b3f2d9dc435a4f9c80690dd6ca0d83a47b911cc7e6e6a1837d"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x2, 0x4) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)) 13:40:30 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getresuid(&(0x7f0000000280), &(0x7f0000000300)=0x0, &(0x7f0000000380)) write$P9_RSTATu(r0, &(0x7f00000003c0)={0x5d, 0x7d, 0x2, {{0x0, 0x41, 0x1, 0xff, {0x0, 0x2, 0x6}, 0x40000, 0x9, 0x5, 0x508e, 0x0, "", 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0x7, 'filter\x00', r3, r4, r5}}, 0x5d) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r6 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000440)=0x7, 0x4) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f00000000c0)=r7) [ 305.883352] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:31 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) mq_open(&(0x7f00000000c0)='\x00', 0x1, 0x8, &(0x7f0000000100)={0x6, 0xb995, 0xc1b0000000000, 0x8000, 0x100, 0x9e, 0x12000000, 0x7}) 13:40:31 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002400075e1dfffd946fa2830020200a000800000000000000f1ffffffff00ff7e280000001100ffff7e63975c0ac47a6268e3406cf055d90f15a30000000000000000000000000000", 0x4c}], 0x1}, 0x0) [ 305.986436] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:31 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000280)={@multicast1, @multicast2, 0x0}, &(0x7f0000000300)=0xc) stat(&(0x7f0000000400)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in=@broadcast, 0x4e22, 0x101, 0x4e22, 0x0, 0xa, 0xa0, 0xa0, 0x3965d0d53e0d5103, r2, r3}, {0x9, 0x44, 0x7fffffff, 0x5888e0e, 0x3d9, 0x6, 0x3ff, 0x6}, {0xffffffffffffffef, 0x5e, 0x7b6432a9, 0xbf}, 0x6, 0x0, 0x2, 0x0, 0x2, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x15}, 0x4d6, 0x33}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1e}, 0x0, 0x7, 0x0, 0x7f, 0x3d8c, 0x8, 0xb398}}, 0xe8) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x100010, r1, 0x100000000) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x28, &(0x7f0000000100)}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) socket$xdp(0x2c, 0x3, 0x0) 13:40:31 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r1}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) fcntl$setown(r3, 0x8, r0) [ 306.076012] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 306.169960] kernel msg: ebtables bug: please report to author: entries_size too small [ 306.210969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 306.238883] kernel msg: ebtables bug: please report to author: entries_size too small [ 306.253926] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 306.286017] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:31 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x40, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @multicast1}, 0x0, 0x5, 0x4, 0x6, 0x5, &(0x7f0000000240)='syzkaller0\x00', 0x1, 0x0, 0x17c94b8f}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000140)=0x8) r5 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4200, r5, 0x5, 0x1) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r4, 0x3f, 0x2}, 0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x18101, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000340)={0x1}) sync_file_range(r1, 0x8, 0x800, 0x0) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) clock_settime(0x0, &(0x7f0000000380)={0x0, 0x989680}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r0, 0x9, 0x1}, 0x14) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000300)=0x1296, 0x2) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000200)) 13:40:31 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0xfffffffffffffffc, {{0x2, 0x4e20}}}, 0x88) fcntl$lock(r0, 0x5, &(0x7f0000000100)={0x2000000400000002, 0x0, 0x0, 0xffffffffffffffff}) 13:40:31 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0xe9, 0x7, 0x0, 0x5, 0x3a47, 0x0, 0x101, {0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x1, 0x10001, 0x9, 0xffffffff00000001, 0x400}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0xe940, 0x2, 0x8, 0x3, r3}, &(0x7f0000000200)=0x10) 13:40:31 executing program 7: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) write$P9_RLOCK(r0, &(0x7f0000000100)={0x8, 0x35, 0x1, 0x2}, 0x8) r1 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000140)=0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 306.449258] kernel msg: ebtables bug: please report to author: entries_size too small [ 306.452627] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x4, @remote, 0x5}}, 0x800, 0x200, 0xfffffffffffff001, 0xc8e}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x3, 0x1, 0x1000}, 0x10) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 13:40:31 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x6, 0x5) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0x1}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:31 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r0, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r0}], 0x1, 0xfffffffffffffff8) dup2(r0, r1) 13:40:31 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto(r0, &(0x7f0000000040)="b3cd13dc8b6a3a957d97d4e458921e86a0d07957de946551dd438852e96a68bb1abaa6ef88d9a050905d31fc86f24697860532aa67a732f0a941d6c7577847916b2543b0987a02bba6bdda4e6e264d776de4623e29d3b3e321ae7a370e29572a7904eb2658d19819f8539f160d5ec6ad33d99ec4b743843bdfa1a9d140be391244b93e00b7255fd2aa1a0d67602e582f87af0ac9664feb8b9468a8fa288ebaca0a18ad92ba2a8e0d77f111dfab6c7b8ac05976bd2ddceb5f5dbdff6b68fcda25a1181117f077043ed85a", 0xca, 0x4, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0xa, 0x1, 0x0) [ 306.565658] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f57691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:31 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000000180)={0x2, 0x8000000000004e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) recvmmsg(r1, &(0x7f0000003240)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001240), 0x0, &(0x7f0000001280)=""/164, 0xa4}}], 0x2fb, 0x0, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000080)) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x0, 0x410, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000004000) close(r2) [ 306.702492] kernel msg: ebtables bug: please report to author: entries_size too small [ 306.733804] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:31 executing program 4: r0 = dup(0xffffffffffffffff) fadvise64(r0, 0x0, 0x401, 0x3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:31 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) r4 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, r4) write$P9_RWSTAT(r0, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x6, 0xfffffffffffffffb, 0x80000001}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 306.825412] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:31 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8000, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x80000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:32 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85") getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0}, &(0x7f0000000080)=0xb) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2}}, 0x20) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2253, 0x220000) write$P9_RCLUNK(r2, &(0x7f00000004c0)={0x7, 0x79, 0x1}, 0x7) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000380), 0x4) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000240)="193009f1ba5b6b80329b82c600fcba7feaee5bbe7738ea9d2e89f855f46be42fe73a2fc8f8c7bb189bd49486be4edac70e8d1fb63b7646ef72fa47aca9b3cb9e05cfc1a27dd8b86959ecb8d95f0af594c2ba0884c8ac88355d7619bc9990ab61590d810710867890dec6dcb48fd66127c22c66764bc7d2e2bea2cc7c0637df3b1226814f638c7ebdddc352f32cf97c4dcb1deaf1800e92babbfaff10664f78b1d326e028e787851b30e039075a377b1de109fff34ee2bb65ad7d4bd7115ed393fe0eaf29b2b5c249b13135ccf2e366600bfe0572499b6fdefbc6ea6ebaa7959f1ec8d3522dcba92d22eaa68ebf673cf5e2539e", 0xcf}], 0x1) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000500)={'security\x00'}, &(0x7f0000000580)=0x54) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000400)={@multicast2, @dev={0xac, 0x14, 0x14, 0x14}, @broadcast}, 0xc) getresgid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000440)={r0, 0xfffffffffffffffd, 0x1}, &(0x7f0000000480)=0x8) 13:40:32 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) [ 307.015519] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:32 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) [ 307.084752] kernel msg: ebtables bug: please report to author: entries_size too small [ 307.113134] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 307.181442] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 307.199321] kernel msg: ebtables bug: please report to author: entries_size too small [ 307.271489] kernel msg: ebtables bug: please report to author: entries_size too small [ 307.303891] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:32 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x4, 0xd2, [], 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f00000000c0)=""/210}, &(0x7f0000000280)=0x78) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:32 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000040)="2af87ea10d85fc3fd2ff5d034b6486aa395f96b0ceb8471be23292b9d5b482eece4edd851ff086c029d41d00fad5b6a91d338bfbd94819b38ea6a3d215d1baf230fabeb5a098a66010e489dcc61e8900fd5d403c431a85af86dd62aea41ebb221186af1b7f33ea4e2dcf789dbf0670", &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x24000) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000100)=r1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000240)}, 0xf) 13:40:32 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:32 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0x4, 0x8, 0x3e6, 0xd4c}, {0x3126, 0x0, 0xf2a, 0x1}, {0x80000000, 0x8eae, 0x800, 0xffff}, {0x10f1, 0xb1, 0x2000000, 0x7d5}, {0x1, 0xff8, 0x2, 0x401}, {0x10001, 0x5, 0x80000001, 0xfffffffffffffff9}, {0xfffffffffffffffc, 0xfffffffffffffffe, 0xd4d, 0x100000000}, {0x80000001, 0xffffffffffffffff, 0x6, 0x1}, {0x100, 0x5, 0x4, 0x800}]}, 0x10) 13:40:32 executing program 0: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000140)=0x1, 0x7, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)=0x2, 0x1) r0 = socket$inet6(0xa, 0x80002, 0x7) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x4}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000080)={r1, 0x73, "c4a80d0f73eedb1cb6cfcb9e101280c158d9541fdb024a959d8d8cf217ac9970e404e9a7ff5e32ae59ad0cc34b168a67d6d525aa505ed6e3d6f906eee04d20ed68f6c9b35446a6040a2092c9bed35d47345324b9a879adfffa0911c47e6243dba78354d2a84f26fe9d571260c1fa3ccad565ff"}, &(0x7f0000000100)=0x7b) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000003c0)=""/200, &(0x7f0000000380)=0xfffffffffffffced) 13:40:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:32 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) fgetxattr(r0, &(0x7f0000000180)=@random={'user.', "6c6ff47573657200"}, &(0x7f00000001c0)=""/169, 0xa9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xffffffd2) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @random="03c1f2f6fde8", 'veth1_to_bridge\x00'}}, 0x1e) 13:40:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f196891d285512c27000000000001371d0000660630c202516e52869b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c733a9c2fffb00f77691567f961489325201001575d631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 307.622236] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x1, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 307.671611] kernel msg: ebtables bug: please report to author: entries_size too small [ 307.672414] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:32 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) dup2(r0, r1) 13:40:32 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x1, 0x3, {0x1, 0x0, 0x7fffffff, 0x0, 0x10000}}) [ 307.745620] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:32 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x10) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/78) accept4$alg(r0, 0x0, 0x0, 0x0) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:32 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x40, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @multicast1}, 0x0, 0x5, 0x4, 0x6, 0x5, &(0x7f0000000240)='syzkaller0\x00', 0x1, 0x0, 0x17c94b8f}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000140)=0x8) r5 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4200, r5, 0x5, 0x1) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r4, 0x3f, 0x2}, 0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x18101, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000340)={0x1}) sync_file_range(r1, 0x8, 0x800, 0x0) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) clock_settime(0x0, &(0x7f0000000380)={0x0, 0x989680}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r0, 0x9, 0x1}, 0x14) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000300)=0x1296, 0x2) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000200)) [ 307.902968] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f57691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 307.992611] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 308.015249] kernel msg: ebtables bug: please report to author: entries_size too small [ 308.034371] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:33 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) dup2(r0, r1) 13:40:33 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = dup2(r1, r2) getpeername$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @remote}, &(0x7f0000000300)=0x10) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) read$eventfd(r0, &(0x7f00000000c0), 0x8) r5 = geteuid() fcntl$setsig(r4, 0xa, 0x6) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getpeername$unix(r4, &(0x7f0000000200), &(0x7f0000000280)=0x6e) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r5, r6, r7) [ 308.070729] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 308.276736] kernel msg: ebtables bug: please report to author: entries_size too small [ 308.332070] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:33 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x3, 0x57, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000140)=""/87}, &(0x7f0000000280)=0x78) tee(r2, r1, 0x400000000008, 0x0) get_thread_area(&(0x7f0000000080)={0x10001, 0x20000000, 0x4400, 0x3f, 0x8, 0x7fffffff, 0x3, 0x1000, 0x0, 0x7fffffff}) tee(r0, r3, 0x6, 0x6) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f00000000c0)={0x3, 0x7, 0x1, @empty, 'teql0\x00'}) 13:40:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fdc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:33 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000006c0)={{0x7da8aded, 0x2}, 'port1\x00', 0x2, 0x1010, 0x8, 0xffed, 0x7, 0xfec, 0x1ff, 0x0, 0x2, 0x9}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @multicast2}}}, &(0x7f0000000180)=0x84) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r5, 0x10e, 0xb, &(0x7f0000f67000)="9adc01ce", 0x4) sendmsg$nl_route(r5, &(0x7f0000002280)={&(0x7f0000000240), 0xc, &(0x7f0000002240)={&(0x7f0000000000)=ANY=[]}}, 0x0) write(r5, &(0x7f0000000140)="2200000018007c4e47d7b1ccff652186979f580700f417e512b87cba48c1cb65d145", 0x22) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r3, 0x200}, &(0x7f0000000200)=0x6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r6 = socket(0xa, 0x0, 0xe7) clone(0x4001c400, &(0x7f0000000380)="a9b65ec0b0bf2280ac6f7b87c41bc5729465280086aa93e8930b0fa1c7e7ee48cc1a0f648779a78ad4c24cb5ae0194792fa5f588e79a2fdc44dddf8320c42fb9a81fbc72d75e3b50e62b3beba8b681bdecf05426a1d1", &(0x7f0000000280), &(0x7f0000000300), &(0x7f00000004c0)="d4ea62f5dba4a3e9586056ef1aee105b9cb5384c7238d3fa1a97bd159c5ddb7bf2af04ed8a9fc9d1f2ca1c1719d1f9cdd1a5ad94ef0b4f12eea87276bdf4005ad97513b2d24b07d5a3ef2145e61736a3519c2bc6ade5836fc7bc13842079e73b7a67fecb030a2023011e8cb4d7ffd943465637a740e14ab88d1f7806d24e2a8eaa2b6b51e76f419058b5e0882d5f72d0d804efad96694e925af2b5a4524a8188ecafef9c9cb4ac3e72c053fb76809135a3491df462e4e3099322d269872ffcf1f7e8ff2012151a6001b733e52ab6349c6dca4c7ed373c0127d588055d658573daf6efff25650288d8279f2d0da58cc570f9f") ioctl$void(r6, 0xc0045c78) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)=0xfffffffffffffc01) modify_ldt$read(0x0, &(0x7f00000005c0)=""/238, 0x35) socket(0x11, 0x5, 0x6) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={r3, 0x7fff}, &(0x7f0000000780)=0x8) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000007c0)={0x8}, 0x4) 13:40:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/full\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="30353c55a422df84512c270000000002516e63daf042568792834c8f8054d584703905000000000000000eefceb8b7cea2844642c732a9c2fffb00f77691567fac148932520fd6157dba98af0609059736e37d0000000000000000000000000000000000186ab72610f688c67bfea8c05170c131b72a61d48bdf91f51ba7cb00d13d6c8f7ef1c39c64bce8f9d94fa7a486ee6094b5b8a48dfd4809eb3a315bb71bc3f74c7c8aeba38a3bf2406e71d5165641ba4a9c95ca36ece3e1e3f13c46b40648517c22413577ee5392060fd16e98a16e3032b74d924e5e4a06d8c6e1e1362ac6b2e3ab1dfe20002bc4d88354b935cc08aa8ec60c3851aee65d43ab53eb000000000000000000000000000000000000000000000000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x16, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:33 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) dup2(r0, r1) 13:40:33 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x401200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f196891d285512c27000000000001371d0000660630c202516e52869b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c733a9c2fffb00f77691567f961489325201001575d631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 308.658832] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:33 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x53, 0x0, 0x0, "9c329d019e674b981d8a28f278f882fe", "bc9cf22f4628aab05ca9881cdbc834a3a2fdfd47e1b3f9b493e98841222f60ae169e9d2ab83a6a0f6b87f612bf1c6055b50b4c148854b841d0733cd7932f"}, 0x53, 0x2) [ 308.704557] kernel msg: ebtables bug: please report to author: entries_size too small [ 308.725625] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x100000000, 0x200000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000100)={0x101, 0x14, 0x6, 0x2, "a3cf3ebe2b678d5e6ce3512828e06932cd2fa909b066561a7ab64958058c4c89"}) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:33 executing program 7: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x20040) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000100)) r1 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x2, 0x8, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESOCT=r3]]}, 0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x9c1}}, 0xe124, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r5, 0xfffffffffffffffa}, &(0x7f0000000300)=0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:33 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x7, 0x5, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:34 executing program 3: r0 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r0, 0x28, &(0x7f0000000000)={0x4, 0x80, 0x7, 0x4}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x3d, &(0x7f0000000080)=""/40, &(0x7f0000000040)=0x4ed) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x401, 0x60000) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x3, @remote, 'bcsh0\x00'}}) 13:40:34 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) sendto$unix(r2, &(0x7f00000000c0), 0x0, 0x810, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 309.002598] kernel msg: ebtables bug: please report to author: entries_size too small [ 309.020532] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001c0001020000000000000000020000006c1aff331f8b14e422ae5995adcb3ab70cb79af946cc8452718262bdaa77d508b6189303e2371a27fe7f46290d64151e983b086ecd262f190f286320429f19d2e517ab2eed09c96dfb6167b762f480abb0d0f2a006ca03b4d502c378ec97404b3489a00c5f60bc655cec1856966c989e32a4b66564cced91aee27c056c16947e02dd92aa997b4dd4873a3256cb95f5c832932805df7da3cbdf21ea6211d69b6982a81814ac363415d71063ff599708e8c986a677dd9e6d5517a4e43704ffba8d624ce3c9cf", @ANYRES32=0x0, @ANYBLOB="0000000008004b01e0000001"], 0x24}}, 0x0) socketpair$inet(0x2, 0x8000f, 0xfffffffffffffffd, &(0x7f0000000100)) r1 = msgget$private(0x0, 0x220) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000140)) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000380)=""/4096) 13:40:34 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r6 = getgid() fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000680)={0x0, 0x80, 0x0, 0x0, 0x8000, 0x2}, &(0x7f00000006c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000700)={0x4ad, 0x73, 0x4, 0x9, 0xfff, 0x10000, 0xffffffffffffff4d, 0x8, r9}, &(0x7f0000000740)=0x20) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() r12 = getgid() r13 = getegid() stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x7}, [{0x2, 0x2, r3}, {0x2, 0x7, r4}, {0x2, 0x4, r5}], {0x4, 0x1}, [{0x8, 0x1, r6}, {0x8, 0x7, r7}, {0x8, 0x1, r8}, {0x8, 0x2, r10}, {0x8, 0x2, r11}, {0x8, 0x6, r12}, {0x8, 0x2, r13}, {0x8, 0x5, r14}], {0x10, 0x3}, {0x20, 0x3}}, 0x7c, 0x3) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000800), 0xffffffffffffffff) r15 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r15, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 309.366138] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 309.443287] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 309.498207] kernel msg: ebtables bug: please report to author: entries_size too small [ 309.546340] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:34 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x46, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:34 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000001000000000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefce7ddf7f81d61228a8b7cea284f0e903704642c732a9c2fffb00f77691567fac148932520fd6157dd631ae23"]) fstat(r3, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000800), &(0x7f0000000900), &(0x7f0000000b40)=0x0) setregid(r5, r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000540)=0x3) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) ioctl$SG_EMULATED_HOST(r9, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000000080)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:34 executing program 7: r0 = dup(0xffffffffffffffff) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10004}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=@deltaction={0x274, 0x31, 0x0, 0x70bd2a, 0x25dfdbfe, {0x0, 0x20, 0xffffffffffffff19}, [@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x4, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x940}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0x708}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0xffff}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0x56a2}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @TCA_ACT_TAB={0x3c, 0x1, [{0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x80, 0x1, [{0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0x14, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x10000000000000}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffffffffff9}}, {0x14, 0x10, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x3f}}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x8015}, 0x8001) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x90000000}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:34 executing program 3: socketpair$unix(0x1, 0x8000000000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000140)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x3c, {0x2, 0x4e23, @multicast1}, 'veth0_to_bond\x00'}) 13:40:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:34 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0xfffffffffffffffe, 0x0, 0x0, 0x800000071fffc, 0x6}) 13:40:34 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x5, 0x7f, 0x1, 0x3f, 0x2, [{0x0, 0x8000, 0x54c, 0x0, 0x0, 0x84}, {0xa980, 0xccf, 0x2, 0x0, 0x0, 0x181}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 309.717228] kernel msg: ebtables bug: please report to author: entries_size too small [ 309.765471] kernel msg: ebtables bug: please report to author: entries_size too small [ 309.775966] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 309.794811] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:34 executing program 5: gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x10) 13:40:34 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0xfffffffffffffffe, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 309.825225] kernel msg: ebtables bug: please report to author: entries_size too small [ 309.848608] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:34 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) unshare(0x20400) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) getsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:40:34 executing program 3: r0 = socket(0x11, 0x3, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={"65040000006e300300200600", 0x3}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0xfc90, 0x0, 0x0, 0x1a3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x007\x00'}) 13:40:35 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0xfffffffffffffffb, 0xffff, 0x4}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x2) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x400) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000003c0)={0x4, 0x8, 0xfa00, {r1, 0x100}}, 0x10) r2 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f00000002c0)=0x6bb) r4 = socket(0xa, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000280), 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r5}}, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r3]}, 0x8c) [ 310.112302] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xa1, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x0, &(0x7f00000001c0)=""/83, &(0x7f0000000280)=0x53) r3 = socket(0xa, 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/autofs\x00'}, {0x20, 'filter\x00'}, {0x20, '/dev/autofs\x00'}, {0x20, '%-/%'}, {0x20, '/dev/autofs\x00'}, {0x20, '.'}, {0x20, '/wlan1selinux'}, {}, {}, {0x20, '/dev/usbmon#\x00'}], 0xa, "f6ea783afed89b53"}, 0x67) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 310.193986] kernel msg: ebtables bug: please report to author: entries_size too small [ 310.211472] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 310.314626] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 310.387223] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:35 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000240), 0xc130a3d2) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000200)) pipe(&(0x7f0000000080)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) write(r1, &(0x7f00000000c0)="75c1f5e04ec6da574a7ffdcc2d4d22eaa01e16b3028de0783e2220f12c0a5fb900b0bdd2ca3ebbf3b3c62be1bd81672ae52ffdadbba047b9aa99e3a8b420177ca7448895a595be73dd1e306d18a40bf9d55605e1553c3816a80665c9f5e17ae7e4a5ac321d6f205facd5e3b6008e522d919dd4ad", 0x74) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="5213ab82f56128f2681fee2e0699df240d277a66c0e6f831804e3e0a0e92ce49adf27ef713823ccbca29bb024d1b350cb1d08d22e054a685f6791b937e0a4826f13a7cbf94e1a05e2e5bf7cc5946229d0bcc090880df61e5e2c28f0ddb7d3bb99b14674767ae09a176798817f5dd4baf69dcced864c4610a7c592c026e1e694212fcedd4e2e7421450084a14bd7a71010522de34824ac31bd4d93e"], &(0x7f0000000180)=0x8) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) socket$inet6_sctp(0xa, 0x1, 0x84) 13:40:35 executing program 5: gettid() readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)=0x3f) dup2(0xffffffffffffffff, 0xffffffffffffffff) 13:40:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c815961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610ac97c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000880)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0xc232, r0, &(0x7f0000000780)="f8", 0x1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0xc0185879) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) 13:40:35 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000000c0)=""/147) r2 = getpgrp(0xffffffffffffffff) prlimit64(r2, 0x0, &(0x7f0000000280)={0x80000000, 0x6}, &(0x7f00000002c0)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) r4 = socket(0xa, 0x1, 0x200000000000003) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000240)={0x9, 0x8, 0x6, 0x3ff}) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:35 executing program 0: 13:40:35 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x8000, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0xa, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x13) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:35 executing program 7: r0 = dup(0xffffffffffffffff) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8) r1 = semget$private(0x0, 0x3, 0x40) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000000c0)=""/116) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) io_setup(0x4, &(0x7f0000000180)) kcmp(r5, r5, 0x7, r4, r4) [ 310.807589] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 310.840654] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x18002, 0x0) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000100)="6ca52b67c560853c6cb7fde4b3391e22f91ca4edf6524519", 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000280)=0x78) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000380)={0xfbc9, 0x1b9, 0xfffffffffffffffd, {}, 0xffffffff}) 13:40:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:36 executing program 3: 13:40:36 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x4000000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={0x0, 0xe36, 0x0, 0x1f, 0x5}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000180)={r4, @in={{0x2, 0x4e20, @remote}}}, 0x84) 13:40:36 executing program 0: [ 311.147077] kernel msg: ebtables bug: please report to author: entries_size too small [ 311.178382] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000100), &(0x7f00000000c0)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 311.256585] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:36 executing program 3: 13:40:36 executing program 0: [ 311.389954] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 311.412473] kernel msg: ebtables bug: please report to author: entries_size too small [ 311.475562] kernel msg: ebtables bug: please report to author: entries_size too small [ 311.496277] kernel msg: ebtables bug: please report to author: entries_size too small [ 311.522354] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:36 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0x4) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x30, &(0x7f0000000080)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e24, @local}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r4, 0x1}, 0x8) 13:40:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000b40), &(0x7f0000000800)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xfffffffffffffeb6) getuid() 13:40:36 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x5) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:36 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000004000)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x80000) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000004480)=@filter={'filter\x00', 0xe, 0x3, 0x400, [0x0, 0x20004080, 0x20004200, 0x20004370], 0x0, &(0x7f0000004040), &(0x7f0000004080)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x40, 0x6a05, 'vlan0\x00', 'ip6gre0\x00', 'syz_tun\x00', 'rose0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @local, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xd0, 0x120, 0x150, [@m802_3={'802_3\x00', 0x8, {{0x4e, 0x0, 0x5, 0x4}}}, @m802_3={'802_3\x00', 0x8, {{0xff, 0x9, 0x4, 0x5}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0xff, 0x4}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x9, 0x8875, 'bpq0\x00', 'bpq0\x00', 'bcsh0\x00', 'sit0\x00', @random="7889fe5034d2", [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @random="5c7774183c3c", [0x0, 0xff, 0xff, 0xff], 0x110, 0x110, 0x140, [@stp={'stp\x00', 0x48, {{0x4, {0x7fff, 0x7ff, 0xcd, @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x6, 0x5, 0x81, 0x2, @broadcast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x4e22, 0x4e22, 0x54, 0x8, 0x10001, 0x1, 0x13f, 0x8001, 0xfffffffffffffffa, 0x8001}, 0x0, 0x8c2}}}, @connlabel={'connlabel\x00', 0x8, {{0x8001, 0x3}}}]}}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x7, 0x8, 0x88ac, '\x00', 'bond0\x00', 'veth0_to_bridge\x00', 'tunl0\x00', @local, [0xff, 0xff, 0x0, 0x0, 0xc609f1705dd0e2a2], @dev={[], 0x14}, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], 0xa8, 0xa8, 0xe0, [@mac={'mac\x00', 0x10, {{@dev={[], 0x11}}}}]}}, @common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xfffffffffffffffc}}}}]}]}, 0x478) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:36 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) connect$rds(r0, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) 13:40:36 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x8150000}, 0x200000}) 13:40:36 executing program 3: 13:40:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:36 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt(r2, 0x5, 0xa3, &(0x7f00000000c0)=""/24, &(0x7f0000000100)=0x18) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0xc0) [ 311.870258] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:36 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) getrandom(&(0x7f0000000040)=""/24, 0x18, 0x2) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000080)) tkill(r0, 0x16) 13:40:36 executing program 4: socket$l2tp(0x18, 0x1, 0x1) accept$alg(0xffffffffffffff9c, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='filter\x00', 0x1) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80800) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) 13:40:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 312.063281] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:37 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000140)="1f0000000202fffffd3b54c007b20000f30501000b000600000423ca0000cf", 0x1f) [ 312.171176] kernel msg: ebtables bug: please report to author: entries_size too small [ 312.172173] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/wireless\x00') readv(0xffffffffffffffff, &(0x7f0000000a40)=[{&(0x7f0000000340)=""/127, 0x7f}, {&(0x7f00000004c0)=""/88, 0x58}, {&(0x7f0000000540)=""/254, 0xfe}], 0x3) preadv(r0, &(0x7f0000000480), 0x1000000000000282, 0x0) 13:40:37 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) [ 312.385135] kernel msg: ebtables bug: please report to author: entries_size too small [ 312.424027] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:37 executing program 0: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x5, 0x0, 0x180000, 0x20000000000001, 0x0, 0x0}, 0x2c) 13:40:37 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:37 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a4220000000000af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e79d6b133eeda382b383863da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd6"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) close(0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:37 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) [ 312.802739] kernel msg: ebtables bug: please report to author: entries_size too small [ 312.815133] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 312.882234] kernel msg: ebtables bug: please report to author: entries_size too small [ 313.010262] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:38 executing program 7: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'bond_slave_0\x00', {0x2, 0x4e21, @multicast2}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) semget(0x2, 0x0, 0x80) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e24, 0x8001, @dev={0xfe, 0x80, [], 0xd}, 0x8}}, 0x9, 0x864, 0x5, 0x2, 0x80}, &(0x7f0000000280)=0x98) [ 313.076999] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:38 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100, 0x0) r3 = socket(0xa, 0x2, 0x0) fcntl$setsig(r1, 0xa, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000100)=0x5) [ 313.196527] kernel msg: ebtables bug: please report to author: entries_size too small [ 313.241643] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 313.259583] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xfffffffffffffffd, 0x400000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x401, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x46) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000800)=[@in={0x2, 0x4e20, @rand_addr=0x8}, @in={0x2, 0x4e21, @loopback}], 0xffffffffffffff0f) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd993b185512c270000000000010000000066e8cc34925c128db5568792834c8f8054d584700300000000000000000eefb9a8b7cea284f0f6036d4642ca32a92ffffb00f77691167fac148932520fd6157dd6fa5a0000000000007d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0xffffffff, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 313.308056] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:38 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)="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") r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000280)) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 313.394490] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:38 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 313.533124] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 313.535176] kernel msg: ebtables bug: please report to author: entries_size too small [ 313.548563] kernel msg: ebtables bug: please report to author: entries_size too small [ 313.634415] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 313.722757] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:38 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x0) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000001b40)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0x4, r1, &(0x7f0000000200)=""/56, 0xa) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, r1) 13:40:38 executing program 4: r0 = socket(0x4, 0x0, 0x9) sendmsg$unix(r0, &(0x7f00000017c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001700)=[{&(0x7f0000000180)="94669734646fe91c7f460cf45d7c29114a58b35084b3f12f0f1ee349248d46824b3a8261c51e331d659a5899082ad13256354ca8d3767710e2031ed31f65698518ce2c8ce1e71addb5be7d11b757a4e67578cafff287ebc5a0770167c131ae709e906f817e548fa4ca9529606d987b75b9c24d28e4a8847cb7ee4cec84e27c2ed83c4aeb85352265ee226a8c10f6", 0x8e}, {&(0x7f0000000240)="89fed6d203b2664ce9345d5a370a53e2e45a08dd0036cdca18d368a09371d07ac6d727c9ce31ee80492ad5529ef51ce3b10d22517fa07db93b53a351c66c21d77d4eff3aaa3b71261a5ea184ab5acbde646269e1fc0e08a0db34444aab2522c85433da206006", 0x66}, {&(0x7f00000002c0)="ca89f3c04e6b395f8dadb0a9eb9d68ede8672f0641a0dd01281b55b14af2d6b2be164810281c759c6920db5411", 0x2d}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000300)="6ed005f1a37ba3b6b130fef110f3f6c8758bab5165a2cc0f55281a1fd406795d54439fe1cf33d8fc2db6d13d4140eedb71d2", 0x32}, {&(0x7f0000000380)="0430aecf87dce7b062a92894", 0xc}, {&(0x7f00000003c0)="5cb4a77e1cf584c51b4c4a990ac82d509c5a1a0fa5b5281b3c4d2de1a69f483c55bcac0038bc4d6727cf03a8de69c6e3fce79d91f48e7df4aa957c3bd2516e3970ec11f4fce19fb9c2239edd5e5a6a7f3982112999098b73600d6d4e2523756f3628b50016d20795f2f32eb623b66d53021d2a7ebf85a1f71e4c9eb2d851a05be3badda5ac6f6d6eb5733a61612f7ff9392729e679249db02bbba70a95ba46d780e93e049387a553c772e3ebabf0b6fe", 0xb0}, {&(0x7f00000014c0)="f8e7548f298562fc395c2313bca9e8801a005982bd982702f812cf0a90792fda4069af95b68d07bae89d47e3b563ced5c24ba7e040e47f5e821659454f81d5a6c02f15add784ad17321bebee41e97d8d1dde7085f740a8d9af3570f2cce1cc7934fce5cfa655deb34311d5961b80607c42a8fadce475cbd09ef1e29c59574dfb0f4c3bc91985c643467238e92099a7cf55f4bfba8b884513e069f499d37fc633de3effc6abe49b5b1333711d6451ec031bfc25eb21605c1612ceb6", 0xbb}, {&(0x7f0000001580)="0ae0642b372eb6005d4343594556734123015ff310218bd4588179fdb81115b6191264be13be9b1549d4bd5110363ee77c37843989045b03684e6d3a3a0bdd5c29f207ad65f2ce4d4b5376c44e581c2cd9", 0x51}, {&(0x7f0000001600)="1437c01814009bb88f279fd4f42a785d738b1f89c7794cd4e76a0145b74756f564841c711e58ea56b065ef5e6263d22558e71d3659630497e0e2c4ec2ae92010d80e23490766346a6964930cd6be8d1a0de24aaea9da477f3b62964884822a64fbd6e09a4ba629cebc26fcbd4d6fd16ac21ab1ebee2825e191c46b8c304928c61d790a5a74a1b419ed63f625c9559eddd1a66aee316ea89019a5f68726444fd3c2c5e2f72f3566dc60c2b9be6bfba8d02540286e8e3ebcb216f3d926fe0a1921789e5586040522ad2028535adeb5f5ed7004cc21509453ca6cf18202c80d0f455ecc81beb3263318bb9070c0f8a5d18ec5fc646970b67390afaa4206112a", 0xfe}], 0xa, 0x0, 0x0, 0x8010}, 0x40) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x80000000, 0x0, 0xfffffffffffffffe, &(0x7f0000001800), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4040, 0x0) 13:40:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x1, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000300)) r2 = socket(0xa, 0x80006, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f00000000c0), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r3, r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:38 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000000c0)={0x5e, @rand_addr=0x7, 0x4e23, 0x2, 'dh\x00', 0x3, 0x8, 0x79}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffd) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r3, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000540)=0x3) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 313.977463] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 313.992562] kernel msg: ebtables bug: please report to author: entries_size too small [ 314.017527] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:39 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000002c0)=0xc) [ 314.051440] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080), 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d66593ae164c990a0028e", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000002900)=""/4096, 0xfffffe6d}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) sendmsg$can_raw(r2, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1}, 0x20) 13:40:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400000, 0x0) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000100)={0x0, 0x1}, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc8) [ 314.337091] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:39 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 314.390951] kernel msg: ebtables bug: please report to author: entries_size too small [ 314.422927] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080), 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x4, 0x800, 0x1) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000100)="4bd1b08ed850700bbede14723343e724d0f053cac52135cdd763123020c678175dcae7a3307aea3036196a4f92abc45eb802854f3114b55a2c084f78e368b5796b228938e6de568e6a05a8c589a715226f6dbed27d9fef8e9c3229ae21c7150522703f16b8f50ed47ca84c233b8632b562a3be16597e418b63f590b5f20d8684f40aebfee93b81d6373d1622ae2f5b2eec228cbfc34bdf4dd0199c6d3138fa1a171af157c1b9d89f673f0a74cbe66f", 0xaf) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x81) fcntl$notify(r1, 0x402, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:39 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 314.559047] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 314.734983] kernel msg: ebtables bug: please report to author: entries_size too small [ 314.807260] kernel msg: ebtables bug: please report to author: entries_size too small [ 314.819209] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080), 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() connect$vsock_stream(r1, &(0x7f0000000800)={0x28, 0x0, 0xffffffff}, 0x10) 13:40:39 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) fsetxattr(r1, &(0x7f00000000c0)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=')bdevcpuset\x00', 0xc, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:39 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d66593ae164c990a0028e", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000002900)=""/4096, 0xfffffe6d}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) sendmsg$can_raw(r2, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}}, 0x0) 13:40:39 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) r4 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) fstat(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) r10 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000740)=0xe8) r12 = getgid() fcntl$getownex(r2, 0x10, &(0x7f0000000780)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) r16 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000980)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000cc0)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="814eaf57009d88c962bc456f8f222ef3370086d19ecf74a6c50412a7488a415f3b5e27483806968c3f0fb8815eadf1b17c90f5b60d410654207346b66517c7ecce8090d066443da02c9c4b590dced86af2d0ceb7139edbf6db7bea079525a5573102cf9ad4c9036eb4b782f201a3dbb08001cf0762a62a42dd098ff4edd984dcc4e81f790f327aa3595611758766cdc4c81d56cf405ef0e47446797797c36eb12f8f3875536e1b93c28e8825af5653444cd0cdb6f9c19deb821f39fb277fc657c5b30f197c614da0550e37d7c13af230021a18c39b38bca9a970a8c31d0763148233eed4464d6d85447d65325c82", 0xee}, {&(0x7f0000000280)="f0f90509d5c48ac36ca8937ac57940cb789c45b31aea26c7ee15c76b507db5e2e2d9945becb9939b45afc9c1a3ceb1e89929793abebda2ac5fe336b57005a81f225658c88744a19ad2dda9c906f79ea4fb8808384a0ad17ddc7594d19b2478bd5ca370250cca3419482fc96456f4caa46f8f", 0x72}], 0x2, &(0x7f0000000b80)=[@rights={0x30, 0x1, 0x1, [r2, r3, r0, r1, r3, r3, r2]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r1, r2, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x18, 0x1, 0x1, [r3, r1]}], 0x128}, 0x48040) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) [ 314.911937] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:40 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) r2 = socket(0xa, 0x1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) rmdir(&(0x7f0000000000)='./file0\x00') setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 315.102243] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 315.151581] kernel msg: ebtables bug: please report to author: entries_size too small [ 315.188060] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:40 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_smc(0x2b, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)="369461093b61b61446210791e589e798480a46f613f4dc4e564fbd0b9f6a924a4a882264cecd41741814969b293b878de27d790fdd924c8a", 0x38, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, r2, r3) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 315.211316] kernel msg: ebtables bug: please report to author: entries_size too small [ 315.242480] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:40 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd9030085512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703b05000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000fc0)="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") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 315.399263] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:40 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000580)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), &(0x7f00000009c0)) r10 = getegid() getgid() r11 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000a00)={{}, {0x1, 0x4}, [{0x2, 0x4, r2}, {0x2, 0x4, r3}, {0x2, 0x4, r4}, {0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x3, r7}, {0x2, 0x4, r8}], {0x4, 0x3}, [{0x8, 0x4, r9}, {0x8, 0x1, r10}, {0x8, 0x4, r11}], {0x10, 0x3}, {0x20, 0x1}}, 0x74, 0x1) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000100)={'bpq0\x00', @random="74f732c03cc1"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 315.531009] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f0000000480)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000500)="87", 0x1}], 0x1, &(0x7f0000000700)=[@sndrcv={0x30}], 0x30}, 0x0) [ 315.730605] kernel msg: ebtables bug: please report to author: entries_size too small [ 315.899511] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:41 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0xffffffffffffffff, 0x44, 0x7fffffff, @scatter={0x1, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/135, 0x87}]}, &(0x7f00000001c0)="a1beb5d8b71a6729c5d467daaf4df76f983c2b160eaedf19a17236cb84403ba3738812dd14306f62f787c450d6241abed953633777d8b107f1e1cb523269fe48aaf0e378", &(0x7f0000000280)=""/47, 0x1, 0x0, 0x3, &(0x7f0000000300)}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:41 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:41 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @local, 0x0, 0x1, [@local]}, 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 13:40:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660658a0cbd5fbac52d6d4537a7d857be130c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000c00)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 316.140629] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 316.157906] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) flock(r0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10840, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x3f) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) setsockopt$sock_void(r2, 0x1, 0x24, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 316.222144] kernel msg: ebtables bug: please report to author: entries_size too small [ 316.256155] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:41 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) signalfd4(r2, &(0x7f00000000c0)={0x60}, 0x8, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000100)=0xfffffffffffffc3b) socket$inet6_udplite(0xa, 0x2, 0x88) 13:40:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:41 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$inet_dccp_int(r0, 0x21, 0x16, &(0x7f00000000c0)=0x6, 0x4) r2 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/178) 13:40:41 executing program 0: r0 = socket(0x10, 0x2, 0xc) r1 = socket$inet6(0xa, 0x3, 0x80) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") write(r0, &(0x7f0000000140)="1f0000000202fffffd3b54c007b20000f30501000b000600000423ca0000cf", 0x1f) [ 316.513427] kernel msg: ebtables bug: please report to author: entries_size too small [ 316.519201] kernel msg: ebtables bug: please report to author: entries_size too small [ 316.563495] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) 13:40:41 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r2, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xbb7) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000100)) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 316.691962] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271635a36f00000000000100000000660630c202516e63da9b9d568792834c8f8054f584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000b40)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 316.802183] kernel msg: ebtables bug: please report to author: entries_size too small [ 316.848387] kernel msg: ebtables bug: please report to author: entries_size too small [ 316.897592] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:42 executing program 2: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r0, &(0x7f00000000c0)='GPL*cgroup*$\x00', 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) readv(r3, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r3, r2, 0x400000000008, 0x0) tee(r1, r4, 0x6, 0xa) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:42 executing program 7: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x181004) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) fanotify_init(0x2a, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0x1c, 0x800) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000440)={&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000380)=""/135, 0x87}], 0x1, &(0x7f0000000300)=""/22, 0x16, 0x4}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) inotify_init() r0 = signalfd(0xffffffffffffff9c, &(0x7f0000000500)={0x7}, 0x8) dup(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000046, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:42 executing program 4: syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1, 0x840) accept4$unix(0xffffffffffffff9c, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) dup(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x80, 0x1, 0x6}, 0x6}}, 0x18) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0x20000000000000e, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000001c0)={@ipv4={[], [], @multicast1}}, &(0x7f0000000200)=0x14) 13:40:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x10, &(0x7f0000000800)={0x2, 0x0, @multicast2}, 0xfffffe66) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000400eefcea8b7ceb484f0f6036d4642c732a9c2fffb00f7ae2309059736e37d00000000000000000000000000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:42 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) [ 317.302482] kernel msg: ebtables bug: please report to author: entries_size too small [ 317.321043] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r2) 13:40:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9010000000000084) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) 13:40:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) dup2(r0, r1) [ 317.438525] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:42 executing program 7: socket$nl_route(0x10, 0x3, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x3, 0xffff, 0xfffffffffffff576, 0xff, 0x0, 0x41e, 0x8000, 0x2, 0x1000, 0x1, 0x4, 0x4, 0x9, 0x6, 0x1, 0x2, 0x6, 0x4, 0x2, 0x3, 0x7ff, 0x2, 0x20, 0x8, 0x1000, 0x4, 0x8001, 0x100, 0x0, 0x1, 0x0, 0x3ff, 0x3ff, 0xfffffffffffff1f5, 0x6, 0x3, 0x0, 0x80, 0x5, @perf_bp={&(0x7f00000000c0), 0x4}, 0x100, 0x400, 0xbce6, 0x0, 0x1, 0x4dc}, 0xffffffffffffff9c, 0x7, 0xffffffffffffff9c, 0x1) syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x4000000000a, 0x404280) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) dup(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 317.548309] kernel msg: ebtables bug: please report to author: entries_size too small [ 317.592549] kernel msg: ebtables bug: please report to author: entries_size too small [ 317.660735] kernel msg: ebtables bug: please report to author: entries_size too small [ 317.661359] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:42 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FICLONE(r1, 0x40049409, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000000c0)={0x20}, 0x1) 13:40:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) dup2(r0, r1) [ 317.748441] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:43 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000140)={0x10000, 0x0, {0xffffffffffffffff, 0x3, 0x2, 0x3, 0x1}}) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r1, r1, 0x9, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x7, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xffffffffffffff3c) 13:40:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/deV/inc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x20000804, &(0x7f0000000800)={0x2, 0x0, @multicast1}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="5ba86e0d6516d72c5b92ef769971fdc19465e394e68e39c19857542f2199288337cb91f2fa07b4c04fcdb580f2e3a8e9895b0e105d31191800ec2e68202f1fa61541e7071f8fd1262319bac197b39103afbff8b1f9a5a525caab800d02b5b7ed2e4cfb41fc4a300509dfc288889040b3f9d0f5276c71f9a08d685e910a526c0d3349a02d4866c1337e2ca2ebf55d6dce622306f5d9cf020a26a380fd6b62311b7454d9d7fc826e847fd1e68796b244c02e001cbfe3897398a4a4b2fda383d0d1a2a9fdc326571aefb0a105ba61cf3f", @ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESOCT=r4, @ANYRESHEX=r1], @ANYPTR64=&(0x7f0000000b40)=ANY=[@ANYRES16=r0, @ANYRES16=0x0, @ANYPTR, @ANYPTR64, @ANYRESDEC=0x0, @ANYRESOCT=0x0, @ANYRES32=r3], @ANYPTR64=&(0x7f0000000bc0)=ANY=[@ANYBLOB="c6c493885c4ebdfa0765f41aabc90f9059f0b528a3b3161751067a429cd396f01e01831bc593f4d6bf86c9d2654d6667afbb6c39aea375cb8fc8a104ff24a8cb207ddbe0bd0c9fc464283d0ac1", @ANYRES16=r1], @ANYRES16=0x0], @ANYRESDEC]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000340)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000000080)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:43 executing program 7: r0 = dup(0xffffffffffffffff) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000100)) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f00000004c0)={0x92, {{0xa, 0x4e22, 0x7, @empty, 0x5}}, {{0xa, 0x4e23, 0x6, @empty, 0x7fff}}}, 0x108) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f00000000c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x0) 13:40:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:43 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x800, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) 13:40:43 executing program 3: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) dup2(r0, r1) [ 318.282621] kernel msg: ebtables bug: please report to author: entries_size too small [ 318.307566] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 318.361321] kernel msg: ebtables bug: please report to author: entries_size too small [ 318.406798] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 318.420107] kernel msg: ebtables bug: please report to author: entries_size too small [ 318.443241] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:43 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x34ce, 0xc000) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000100)={0xa, 0x2, 0x9, 0x4}, 0xa) 13:40:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x1000000000004b, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:43 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000000c0)={0x1, r0}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:43 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x448, 0x288, 0x0, 0x288, 0x288, 0x0, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000000c0), {[{{@ipv6={@local, @mcast2, [0xffffff00, 0xff000000, 0x0, 0xff000000], [0xffffffff, 0xff000000, 0xff000000], 'rose0\x00', 'ipddp0\x00', {0xff}, {}, 0xa5, 0x4e22, 0x4, 0x8}, 0x0, 0x110, 0x150, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x2, 0x7, 0x1, [0x7, 0x245, 0x0, 0x200, 0xfffffffffffffffb, 0x4, 0x2, 0xd0d9, 0x5, 0x2, 0x948, 0x80, 0x2, 0x6, 0xe4, 0x86a1]}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x80000001, 0x1, 0x401, 0x2, 0x80000000, 0x2, 0x5]}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x43f5, 0x5, 0x1, [0x8, 0x7f, 0x1, 0x7, 0x8001, 0x2, 0xfffffffffffffff7, 0xfff, 0x70000000000, 0x3f642e1a, 0x80000001, 0x6, 0x81, 0x1, 0x81, 0xffffffffffffff81], 0x4}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x2998, 0x1, 0x3}}}, {{@ipv6={@empty, @mcast2, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0xffffff00, 0xff], 'dummy0\x00', 'ip6gre0\x00', {}, {0xff}, 0xff, 0x3, 0x7, 0x50}, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x10, 0xf6, 0x7f}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(0xffffffffffffffff, r1) [ 318.706491] kernel msg: ebtables bug: please report to author: entries_size too small [ 318.746219] kernel msg: ebtables bug: please report to author: entries_size too small [ 318.760300] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:43 executing program 4: r0 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x81, @mcast2}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400206) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x40c, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000044}, 0x4001) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000300)={r3, 0x8, 0x30, 0x2, 0xf38}, &(0x7f0000000380)=0x18) r4 = socket(0xa, 0x1, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 318.801427] kernel msg: ebtables bug: please report to author: entries_size too small [ 318.805089] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:43 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f00000004c0)=""/4096}, &(0x7f0000000180)=0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x40000) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000014c0)=""/4096) 13:40:43 executing program 3: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 318.903186] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 319.107355] kernel msg: ebtables bug: please report to author: entries_size too small [ 319.183448] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:44 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) prlimit64(r4, 0x40000005, &(0x7f0000000140)={0x9, 0x60f6}, &(0x7f0000000100)) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x12c, r5, 0xf090f78ef8b8ba1d, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x68, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x816}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffff0001}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf30}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100000001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4008804}, 0x1) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r0, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f1637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6ce6b2eb2010db5157dd631ae2300000000000000000000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, 0xffffffffffffffff) 13:40:44 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) r4 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000100)={{0x5, 0x7, 0x2, 0x78de, '\x00', 0x10001}, 0x3, 0x40, 0x0, r4, 0x3, 0xfffffffffffffffd, 'syz0\x00', &(0x7f00000000c0)=['filter\x00', 'filter\x00', 'filter\x00'], 0x15, [], [0xf1, 0x1f, 0x0, 0x5]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:44 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x10, 0x200) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) 13:40:44 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1, 0x2, 0x8, 0x1, 0x7ff}}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 319.394012] kernel msg: ebtables bug: please report to author: entries_size too small [ 319.421123] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:44 executing program 3: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 319.435109] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 319.459327] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:44 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x10001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:44 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x101140, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x1, 0x1, 0x8004, 0x398, 0x6, 0x9, 0x8000, 0x40, 0x0}, &(0x7f00000007c0)=0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000800)={r2, 0x2}, &(0x7f0000000840)=0x8) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000880)='system.posix_acl_access\x00', &(0x7f0000000980)={{}, {0x1, 0x3}, [], {0x4, 0x94d7f19d8bd3f980}, [{0x8, 0x1, r3}, {0x8, 0x4, r4}], {0x10, 0x3}, {0x20, 0x2}}, 0x34, 0x3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000003c0)={{0xa, 0x4e24, 0x3, @local, 0x5}, {0xa, 0x4e24, 0x7, @local, 0x3ff}, 0x300000, [0x5, 0x7, 0x401, 0x3, 0x2, 0x7, 0x5, 0x200]}, 0x5c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_generic(r1, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x2e4, 0x3a, 0x320, 0x70bd2a, 0x25dfdbfb, {0x15}, [@generic="d46dab1f3923d48de072eb3098fc7e6c4eaf3f249cb0a324a7048821ea67538e94ba2638ad5fc3be09eeb319cfe2d088ab2c0824f92f384e976581e53a380c736e3fddbab65b19ffbd247f367b10ce6681e0a9313fbda88b9b5976acf4f1b66028f27f7cd8df38d4f4ad1cfa5888683fb5d82d8da22083b342", @nested={0xcc, 0x6, [@typed={0x14, 0x61, @ipv6=@loopback}, @generic="ced934be3353883a31c4abc1bde09f58882907afcb7b0984791e7fe345f0eba5c48641c3a57fddec448d0e6fc95638d457f9b9", @generic="1bd1ba965380f2febab54f475432b75654e6719615b876ab596cadaba4ce8a48b381a0bd1c46b74a45c50817c7c6b970775db3623e00b74f01a1c241ae4b936bba47aed749b7a401a4cc02ee9452a66a80c7d0a09f64dc34a799a20bec2e8bb61332afdcbc93fc4319849fc75e9400d753c1", @generic="958dbeb57583c54d40fd5b7155"]}, @generic="f07b44872b94ad7a2137d54aae171ebbc535d22a805a54a20a2b21e3fb9500ebf9ff059806739b964848180f37c27aad30f6cfe93a0b0d5dc0ae18ccf70cd47e44f872997513d99615e0cf0073519e385f94332e56228652bd5137ff6c792bdfa7252cc2ce5436bc02a4719aca52499a00725bffd63b4db0ab949df734aebe5a175cda9ed57956e5597ae47035c1632fbec3e18721f4e8b0c4838b60fae100c8870670cf5e746599121144f8072b3eff558f2d9329be64765008b0e5f10bac15f9784cfb95947fc30214b4c798bc0cc18e8f1302cb30cbce9eab6e41cb2a8b3a329126b6d9b513154418480373", @generic="a34799bdd9b7351d52f25ca0ae520e740d637f70163534f68399f5507283e5936cc081ee239c0d82e7cc560e6e83a4fe2db1656a26fec7a3514a50bd949eb9a8f08120efff5a012f516f80c56ffa81849be30f9ecb0a94b989c9d212fb305b6ce4c5ddacd1818648d5f29a865c8d515c5cdfcaae3e24880833678277bd1405c7391dd220b384b55eaf8221497903273d471c6db4873f7b0388d8224017"]}, 0x2e4}, 0x1, 0x0, 0x0, 0x8000}, 0x44800) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r7 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r5]}, 0x8c) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000100)={{}, {0x1, 0x1}, [{0x2, 0x6, r8}, {0x2, 0x7, r8}, {0x2, 0x2, r8}, {0x2, 0x7, r8}, {0x2, 0x1ebad79ba2844369, r8}, {0x2, 0x7, r8}, {0x2, 0x1, r8}, {0x2, 0x6, r8}], {0x4, 0x1}, [{0x8, 0x1, r9}, {0x8, 0x4, r9}, {0x8, 0x4, r9}, {0x8, 0x1, r9}, {0x8, 0x2, r9}], {0x10, 0x3}, {0x20, 0x7}}, 0x8c, 0x1) [ 319.527145] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x8020002, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:44 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000000c0)=0xc) [ 319.787384] kernel msg: ebtables bug: please report to author: entries_size too small [ 319.814751] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x400201) openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r3, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d56b4b2f65679f08792834c8f8054d584703905000000000080000eefcea8b7cea284f0f6036d4642c716a97fac148932520fd6157dd631ae2309059736e37d0061bd6b957d31d9296125b5a058674d64073a1feba12e196d066ddce6aa54f34edb3a597e502f8e98787690f160a63b9651d79ff42f049d845e81203f0dcc052a89fed77f2d8c2a698c2576827f12ca29936d174f4a059e61561f72065697429cde5eaaa0331994def336adb0fb330e82ecb6f1f58aee1a54984154c6a5e8a30f385c2030a101b47c3a61d45148f5234028d86fd63251f83dd4d87cfb04c82fea135e40f93202828d324ae9c9913f12185e030a36034a50c75360cf474399ccc55f1bea237f81e6efd86fb4a7606c074558c45e45791436aeba3b"]) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000540)=0x3) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000d80)="ed1777f518e2e000c09387bc8cf62ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd083bd313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b833a3089e5f0df8ab16b51a7e531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf5129e733d0475c13a217acccd30688c5c79f7861e00000000000000000000") write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:44 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000380)=0x8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000400)=@req={0x28, &(0x7f00000003c0)={'ip6_vti0\x00', @ifru_map={0x40, 0x3, 0xeca, 0x7, 0x8001, 0xffff}}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000500)={r4, @in6={{0xa, 0x4e23, 0x8, @local, 0xc10a}}}, &(0x7f0000000240)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYBLOB="76000000eeafad5298bc1737aa091afafd1091d0ed96b0182fdd840b68146108ad548160047abc4cbf8104bda7d229f6dde64bb7a8738c8ba12a5f70f3c9a6117c8b68c1674540720b3fcf545d7e17d55628fd83a4a5d80c55c52b2dcf1d676b8f16853753736135571542e1e226e07f00f32cedd0b0fcff36ee"], &(0x7f0000000300)=0x7e) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000000c0)={0x8001, 0x8, 0x4, 0x0, 0x0, [{r0, 0x0, 0x10001}, {r1, 0x0, 0xc793}, {r3, 0x0, 0x5}, {r3, 0x0, 0x80}]}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) [ 319.866101] kernel msg: ebtables bug: please report to author: entries_size too small [ 319.988169] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:45 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 320.101440] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 320.138519] kernel msg: ebtables bug: please report to author: entries_size too small [ 320.200502] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:45 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) get_mempolicy(&(0x7f00000000c0), &(0x7f0000000100), 0x2, &(0x7f0000ffb000/0x3000)=nil, 0x0) 13:40:45 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:45 executing program 7: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000340)="cde01bf0e42aefe2857feb7d39cb75fe9c78a6357312c0903bdd7ec8539b7af9a50aaa085e1ac1353b7b8c3557ab1c08ca54ef50e610fe9fdbdf155c7ce0e0a1e262542c4897023602faece61cefbee12e4a12eba43545811e2504f3a9465b1a1e600f0d67851394d7e408a05fd8e2295f33281119e421cbaf66761de129583368f6b1591335ca2df155aa32ab22fd845696e49a16d9f4c1fd6343cf6189e476b7294320898870d40273ebdee43dc766c6fc873782ea59ea5aa400000000000000000000000000000000", &(0x7f0000000200)='nodevnodev,\x00') dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0x3, 0x0, 0x1000000000000000) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:45 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) acct(&(0x7f0000000180)='./file0\x00') pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000000c0), 0x0) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x600, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RLERROR(r1, &(0x7f0000000080)={0x10, 0x7, 0x1, {0x7, '\'vmnet1'}}, 0x10) 13:40:45 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 320.463530] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:45 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x40, 0x9, 0x4, 'queue1\x00', 0x1}) [ 320.531402] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x422002, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xfffffffffffffffd, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)=""/97, &(0x7f0000000140)=0x61) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1, 0x8) symlinkat(&(0x7f0000000180)='./file0\x00', r3, &(0x7f0000000200)='./file0\x00') 13:40:45 executing program 4: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) 13:40:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8e00af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000e48930c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd604000000000000007d00e095959ad4581524f716050c3944936c4e9648e72be8856eb81c8be6fb9ba17f3bb2423580e911678708c7376f7ba49e80ab3ee28e86d443151b15873f8766915adfd9f2fef0c339ffa1fbf6f8d18ec6fb551678018e022d991265d626bc0da8fbae0c23b0c70d760a5bc63d08c5ede489ebdf127031d3d8c24d6e50e247d3169a"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:45 executing program 5: exit(0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) listen(r3, 0x0) [ 320.710913] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 320.749506] kernel msg: ebtables bug: please report to author: entries_size too small [ 320.787308] kernel msg: ebtables bug: please report to author: entries_size too small [ 320.824117] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:45 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:45 executing program 4: socket$inet6(0xa, 0x5, 0xa25) r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x1, 0x20000) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="d20100000000000040000000000000000200000000000000", @ANYRES32=r2, @ANYBLOB="00000000010000000000000000000000000000000000000000004000", @ANYRES32=r2, @ANYBLOB="000000001f000000000000000000000010000000000000000000000042bb84befb5de6a17a09a790a2ed0a9a36f8085ab65fbd6132085ad76415d75b5bec866e8503e72afa90036d8ecac8157270f52807fc6c134c770552f9c18bbf9731136a2daf57645d4ae5c2e36046858f24ce"]) openat$userio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/userio\x00', 0x20000, 0x0) getrandom(&(0x7f0000000240)=""/158, 0x9e, 0x3) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000380)={@mcast2, 0x7f, 0x2, 0x3, 0xe, 0x100000001, 0xff, 0xfffffffffffffc00}, &(0x7f00000003c0)=0x20) ioctl$sock_ifreq(r3, 0x8997, &(0x7f00000000c0)={'ip6tnl0\x00', @ifru_map={0x8, 0x800, 0x36c, 0x7, 0xff, 0x4}}) prctl$getreaper(0x19, &(0x7f0000000080)) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000200)={0x0, 0xfffffffffffffffc}, 0x2) [ 320.848492] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x10000, 0x80000) socketpair(0x13, 0x80000, 0xfff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000400)={0x78, 0x27, 0x202, 0x70bd27, 0x25dfdbfe, "", [@generic="bcd22ee7a85362a65d31df006ccb2231ece636dfe40d2c2089cdcacbbd312841ad76a9678bc4bc36f119eb40434bf9f66d4c8053649e4e03d36d3753489fc51b7da2de4ad69f7b3df0e1e205079495ac6666c7b0ae993e", @typed={0x8, 0x2a, @uid=r3}, @typed={0x8, 0x4f, @ipv4=@local}]}, 0x78}], 0x1, 0x0, 0x0, 0x10}, 0x40000) socket$netlink(0x10, 0x3, 0x1f) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) r4 = accept(r0, 0x0, &(0x7f0000000100)) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000180)={0x400000000000040}, 0xfffffebb) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000300)=0xc) 13:40:45 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) fsync(r2) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:46 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 321.124561] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:46 executing program 0: socket$inet6(0xa, 0x80003, 0x5) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:46 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000000c0)=""/62) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x2b, 0x6, 0x2, 0x8, 0x4, 0x1000, 0x1f, 0x4, 0x3, 0x6, 0x1, 0xfffffffffffffff8}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:46 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x101000, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) [ 321.372587] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:46 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) readv(0xffffffffffffffff, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(0xffffffffffffffff, r1, 0x400000000008, 0x0) tee(r0, 0xffffffffffffffff, 0x6, 0xa) accept4$alg(r0, 0x0, 0x0, 0x80800) fgetxattr(r1, &(0x7f0000000100)=@random={'system.', '!nodevproc^(ppp0\x00'}, &(0x7f0000000140)=""/27, 0x1b) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x80, 0x84000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) 13:40:46 executing program 6: r0 = socket$inet6(0xa, 0x7, 0x42) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x85, 0xfa00, {0x1000000000001, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7dc7eb2616021bdaef63271637a36fd991b185512c2708000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, r6) keyctl$unlink(0x9, r7, 0xfffffffffffffffd) keyctl$read(0xb, r7, &(0x7f0000000000)=""/18, 0x12) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000540)=0x3) r9 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r9, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x200000, 0x0) ioctl$EVIOCGPROP(r10, 0x40047438, &(0x7f0000000f40)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r9, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r11}}, 0x18) ioctl$SG_EMULATED_HOST(r10, 0x2203, &(0x7f0000000000)) 13:40:46 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0xfffffffffffffffc) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 321.452573] kernel msg: ebtables bug: please report to author: entries_size too small [ 321.461273] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:46 executing program 0: socket$inet6(0xa, 0x80003, 0x5) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 321.525321] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:46 executing program 4: r0 = dup(0xffffffffffffffff) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) write$FUSE_BMAP(r0, &(0x7f0000000140)={0x18, 0x0, 0x6, {0x5}}, 0x18) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000100)={@empty, r1}, 0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) 13:40:46 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x80000) 13:40:46 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) socket$inet(0x2, 0x3, 0x1000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 321.801138] kernel msg: ebtables bug: please report to author: entries_size too small [ 321.830921] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) syncfs(r0) 13:40:46 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:46 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000080)={0x5}, 0x4) 13:40:46 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x109002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:46 executing program 0: socket$inet6(0xa, 0x80003, 0x5) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 321.914848] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 321.930135] ucma_write: process 648 (syz-executor6) changed security contexts after opening file descriptor, this is not allowed. [ 321.960607] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000880)='statm\x00') write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)={0x0, 0x0, 0x5}) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e20, @dev}}) flock(r0, 0xc) 13:40:47 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) fcntl$getownex(r2, 0x10, &(0x7f0000000280)={0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000018c0)=ANY=[@ANYBLOB="281300001100000627bd7000ffdbdf2508004f00", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\b\x00;\x00', @ANYRES32=r4, @ANYBLOB="e8105a0008008100", @ANYRES32=r5, @ANYBLOB="24002e0073656c696e75786c6f706f7369785f61636c5f61636365737373797374656d000400440008002d0001f2ee26d49c2916acf50694fa7bb54dc03e3880f314dbe1dd39ac5367e21533da1e4a7a70a7aed152feb8a19fe236416611edfa1eaa10996693f17408175affdd7074dbc76ac02d53998c88f982b2bb2045b259d9497025e36c0b9f4caa339cde39e92ff02db95bedbbd37ae97012514a78dfa4d3d89477853c6394dc49b511685012cfd1e8a3928e8ebd8a3d0d85f9c68d82c890c3bf809a", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB='\b\x00&\x00', @ANYRES32=r1, @ANYBLOB="14004700fe80000000000000000000000000001800000000"], 0x1328}], 0x1, 0x0, 0x0, 0x20008840}, 0x40000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r7 = socket(0xa, 0x800, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 322.095868] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:47 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) r1 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0xfffffffffffffff9, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) syz_open_dev$evdev(&(0x7f00000004c0)='/dev/input/event#\x00', 0x1f, 0x400201) openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x37}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="31353c55a422df9f4f8600af8f1968830a7dfaef63271635a36fd9910500512c2700000000000100000000660630c202516e63da9b9d97ad86c956343abd5fea46d18fc8568792834c8f8054d5867039050000f0f6036d4642c732a9c2fffb00f77691567fac148932520f"]) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000540)=0x4000000000000003) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000600)=0xfffffffffffffe87) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x28, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f00000001c0), &(0x7f0000000300)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r0]}, 0xa0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:47 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:47 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800c1, 0x4) 13:40:47 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x7fff, 0x8000, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r3, @in={{0x2, 0x4e20, @multicast1}}, 0x43, 0x2}, &(0x7f0000000280)=0x90) [ 322.398480] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:47 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) sendto$inet(r1, &(0x7f0000000280), 0x0, 0x7e, 0x0, 0x0) [ 322.489810] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 322.500235] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3, 0x80400) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$KDSETMODE(r2, 0x4b3a, 0xea7) 13:40:47 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 322.577376] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:47 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = semget$private(0x0, 0x3, 0x0) semctl$GETZCNT(r3, 0x2, 0xf, &(0x7f00000000c0)=""/199) setns(r0, 0x4000000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:47 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000009c80)=[{{0x0, 0x0, &(0x7f0000004fc0)=[{&(0x7f0000004ec0)="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", 0xfe}], 0x1, &(0x7f0000005000), 0x0, 0x4800}, 0x80000000}, {{0x0, 0x0, &(0x7f0000009940)=[{&(0x7f0000009880)="67a02abb314ba250fc75911eef489e693d04909981f293def2f28e5adee72072f1ecf60816e014b7e1f7fb1936143da9d1aa10817f1bf0de807e4e0f06254c81c376fbb58edaf0472ab226b9d992149c66a5b73356f2a0500b13224debb7524a7a094a9cd43f53a54278c62d15b70bb126c394019b969ff09638a2b93ebd1836e19c35bc8ac4a2769e72117c9d6a8ec1b5a288c28cee90f3c97e89012ac151b061575f519f2386f5a4f2321cebf770dbbdf0677e223c09d2cf760d36aeb281ab", 0xc0}], 0x1, &(0x7f0000009980), 0x0, 0x488c5}, 0xfffffffffffffffa}], 0x2, 0x800) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001100090469001b00810800000700fd3f03000000450001070000001419001a0004002300030000000200000809c99183a8a5000200", 0x39}], 0x1) [ 322.748572] kernel msg: ebtables bug: please report to author: entries_size too small [ 322.873486] kernel msg: ebtables bug: please report to author: entries_size too small [ 322.894501] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 323.039837] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:48 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x7, 0x3}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r4, 0x40, 0x3687, 0x6cb9}, &(0x7f0000000140)=0x10) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:48 executing program 6: r0 = socket$inet6(0xa, 0x1000000000003, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000880)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xb9d, @mcast2, 0x101}, {0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0xfffffdfc) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000d80)=ANY=[@ANYBLOB="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"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000c80)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) ioctl$SG_EMULATED_HOST(r9, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:48 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x81) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x40, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x4, 0x8) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000180)=r1) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000140)=ANY=[@ANYBLOB="010008000000000000005d369a80dd17aaaaaaaaaabbaaaaaaaaaaaa000000000000cb13bc568732ffffffffffff000000000000"]) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, 0x0}) kcmp(r3, r4, 0x0, r2, r1) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000300)={0x1, 0xff}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x4a, "ff957c7ebc6555b1c053b829bb538b0947523cb68450a928e8724a9825204e8e8031c1bde3748fb5fb0415749bd274544455b5eb3c598a47e34b94b631cea276733d4bc94e4efb1b64ca"}, &(0x7f0000000400)=0x52) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000440)={r5, 0xca, 0x26, "b257167b62c527dbd2ac5e6cb61c92172c61a836f05b46eb2895c36ee3aaefd825d17ae05459"}, 0x2e) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:48 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:48 executing program 5: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f0000000000)) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) clock_getres(0x8000005, &(0x7f0000000080)) 13:40:48 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0xfffffffffffffffd, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:48 executing program 4: 13:40:48 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:48 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x7, 0x10001, 0x7fffffff, 0x5, 0x0, 0x8001, 0x40000, 0x5, 0x3ff, 0xfffffffffffffffe, 0x7fffffff, 0x0, 0x3, 0x6135, 0x7, 0x8, 0x7ff, 0xfffffffffffffff9, 0x1ff, 0x7, 0x10000, 0x3, 0x0, 0x1, 0x9, 0xa8e, 0x67, 0x5, 0x0, 0x4a, 0x1, 0x6, 0x100000001, 0x383, 0x3, 0x7fff, 0x0, 0x4, 0x4, @perf_config_ext={0xa, 0xb22}, 0x20080, 0x7fff, 0x6, 0x0, 0x0, 0x5, 0x3fb}, 0xffffffffffffff9c, 0xa, 0xffffffffffffffff, 0xd) dup2(r1, r0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x100, 0x200) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x803) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='+h)$%ppp1trusted\x00', r2}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0x1001}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r7, &(0x7f0000000440)={0xa, 0x4, 0xfa00, {r8}}, 0xc) 13:40:48 executing program 5: 13:40:48 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000300)={0x0, "152f5993da54f3aef5c22ac0da090868d5f59d72fe32dbe24e14c8c2b790ab01b852b6edec4a9187257a4c6f0a9c0a8d752f817f3f3e50cdc7a1e0fa1e508f032090b6a56c7158688098ce489d1920be5c6b0f48559b90a4993bd17b0154b9cda5454c45f6702b64cd53d8b7d323ef7253f35aeffd42c1d264a2f1b2b7a5bb0f0722aee1dabb768b49864416e4935d83ca4ef54913d7a1c9f8875c28"}, 0xa4, 0x800) clone(0x20800504, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) capset(&(0x7f0000000040)={0x0, r4}, &(0x7f0000000080)={0x46e, 0xc7ba, 0x100000000, 0x1, 0x0, 0xdad4}) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000280)={0x7fff, 0x200}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) 13:40:48 executing program 4: 13:40:48 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:48 executing program 5: 13:40:48 executing program 4: 13:40:48 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 323.922202] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 324.012632] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:49 executing program 5: 13:40:49 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) clone(0x2142001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r1 = socket(0x8, 0x9, 0xfffffffffffffffe) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000001c0)) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000100)=""/77, &(0x7f0000000180)=0x4d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={0x0, 0x2}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000380)={r3, 0x9}, 0x8) 13:40:49 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x80000000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000002c0)=0xffffffffffffffa2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x490, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000100), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x9, 0x40, 0x0, 'gretap0\x00', 'bond0\x00', 'veth1_to_team\x00', 'erspan0\x00', @dev={[], 0xf}, [0x0, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff], 0xe0, 0xe0, 0x130, [@pkttype={'pkttype\x00', 0x8, {{0x7, 0x1}}}, @mark_m={'mark_m\x00', 0x18, {{0x9, 0x3, 0x3, 0x1}}}]}}, @common=@log={'log\x00', 0x28, {{0x100000001, "cb2ce8089d1f8ecf9b851f237bd3642e7f360218654ffcdf0cb4254a6b23", 0x1}}}}, {{{0x5, 0x40, 0xf8, 'veth1_to_bond\x00', 'ip_vti0\x00', 'veth0_to_bridge\x00', 'ip_vti0\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0x0, 0xff, 0xff, 0xff, 0xff], 0xb8, 0xb8, 0x1e8, [@limit={'limit\x00', 0x20, {{0x4, 0x0, 0x40, 0x10000, 0x9, 0x9}}}]}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xc9f, 'system_u:object_r:setrans_initrc_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x5, 0x20, 0x899f, 'bridge_slave_0\x00', 'veth0_to_bridge\x00', 'veth0_to_team\x00', 'team_slave_0\x00', @link_local, [0x0, 0xff, 0x0, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xe8}}, @common=@nflog={'nflog\x00', 0x50, {{0xe2f, 0x1, 0xffff, 0x0, 0x0, "77ac089b3c8d57a9e2a628f7a590229221aeaf477c93ffc4d0f6fbfe975f6b1337b6b5b541468a30db05176312d5e9bcefcbbe96de156d8c4369bb12f1d5e858"}}}}]}]}, 0x508) getsockname$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10) 13:40:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) getuid() 13:40:49 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:49 executing program 4: 13:40:49 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:49 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) [ 324.305471] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:49 executing program 5: [ 324.368334] IPVS: ftp: loaded support on port[0] = 21 13:40:49 executing program 4: 13:40:49 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000200)=0xbb) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[{0x8}, {0xf, 0x1}, {0x4, 0xffffffffffff9750}, {0xb}, {0x3, 0x8}, {0x7, 0x9}, {0x8, 0x19edd735}, {0xa, 0x4e5}, {0xf, 0x5}], 0x9) [ 324.410467] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:49 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:49 executing program 4: 13:40:49 executing program 5: [ 324.773766] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:49 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7d}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 324.906251] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:50 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 325.053515] IPVS: ftp: loaded support on port[0] = 21 [ 325.176544] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 325.231099] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:50 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280), &(0x7f0000001580)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) writev(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)="44fe2a7b65c45d1c959a9bfe4beccdfac7ce897e5f82cb12ebb616a9bfcc4e5a354a4aa65e1dcc525f6863221ae6734bdc3743cb35bbb82862a22c9b840618bb11bce18e6e9b858a1f1e04e9ea33baa0d881d4c1f1a89fed3edf819688ce790a2d7b35c18dba184471350d8fad7dcc483c77148fddf670ecf9b76382243b670f6823f68cd9e0fe0ca361f6a2b4a4268defed8220bde10f76c33566abae5e1bc12490159611fe2290f57820dacd93f071ebf0b05dac899dcb6ff91c89d6f3811b", 0xc0}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000180)="c81ea06f720e7b3030db31c1be2cc2d16f606a610bd999635b880f7a2ba9d08da4a0d2efaf249ec276cac7f8d0905d37996edd6b7f152f16b78aa74d445998026c509719fce0712c510efa77c6a93c5533fe81df4788944fa6390bef70f1dd5700a72b51ebc05900df3f7868f073b8203aa604a4653a5874278687ed6380eae93b", 0x81}, {&(0x7f0000000380)="344b69c7d3a30c206ee254e8c68b7020870150b38807fd31dd5c7178bc28bcaab327f9f191eab5604040a8d704636004a542b925d6372fe11ed58baee87485afc55b9cbec16d85f0ffdb31ffd31d71c72603623d91d218a1c15037a237dc0d8e57e299430ca2d5d91b6c8f4de6769cad77", 0x71}, {&(0x7f00000014c0)="4c19e6938ef4247b642ddd0d0a5db82ade4eb49ad4affbbf99e1c494c7937ab13dfd9fea7274e1102e381180ecd580c868be452b587e7b6e0d0d1bfec23171ddf87bea64fa3db0309a6862b991c81e2fccda98caedc51a81897419de78903315fc996d79fb88c298b6b4ba217df80e8d4f89f0a335c08aa5b6a6e73f25db527b99b4278c745a65befb86e78e16eb990f282a9794ba907e", 0x97}], 0x5) 13:40:50 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_DISCONNECT(r0, 0xab08) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0x0, 0x3, 0x200, 0x3, 0x7fff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x3ff) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) open(&(0x7f0000000100)='./file0\x00', 0x8000, 0x8) tee(r1, r3, 0x400000000008, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000140)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x5, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:50 executing program 5: 13:40:50 executing program 4: 13:40:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:50 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x2, 0x1000, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000300), &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}, 0x1078) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) recvfrom$packet(r0, &(0x7f00000000c0)=""/250, 0xfa, 0x1, &(0x7f0000000200)={0x11, 0xc, r4, 0x1, 0x81, 0x6, @random="8512657e9682"}, 0x14) tee(r0, r1, 0x100000001, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:50 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8d1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 325.518050] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x10001) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:50 executing program 7: epoll_create(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x800, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) r1 = dup(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e23, 0x6, @loopback, 0x8001}}, 0x45a8, 0x750, 0x3, "e45889ce8cfd10ae5498b473aa1eff7ea36b41f2ad509e6793c14a9555ea15aba4d47e1da3030a27a88c9677c46bc997772f6dbc8ec7e43202e6e6c8b9bc44ca8884741fcbd8e0b1c651b97d585d5e2f"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x2, 0xff, 0x9, 0xfff, 0x7, 0x2, 0x8, {0x0, @in6={{0xa, 0x4e21, 0x28fb, @empty, 0x80000001}}, 0x2, 0x100000000, 0xb3, 0x5}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r4, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e21}], 0x20) r5 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r2]}, 0x8c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:50 executing program 5: 13:40:50 executing program 4: 13:40:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 325.845256] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:50 executing program 5: [ 325.892416] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:51 executing program 4: [ 325.960443] kernel msg: ebtables bug: please report to author: entries_size too small [ 326.036239] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:51 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 13:40:51 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) read(r2, &(0x7f0000000100)=""/40, 0x28) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xfffffffffffffd03) [ 326.278616] kernel msg: ebtables bug: please report to author: entries_size too small [ 326.373149] kernel msg: ebtables bug: please report to author: entries_size too small [ 326.400012] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:51 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000000c0)="190c14bdb61d2bdaa00879e45472b6d8ff156f0d8c5d6142bc5281c83e93a2a3185922a6278b8eeaa5cadf17ee7b5276458f787a3140b0e3e5b61c3a34f8cec85b14dc19b79ccacb97bcdbf840bf720390e4e3f2e57235d9ba5bc531c86cae720e80b86e52d7f9d1477dd29b767ac930ae93ce4296446eb811078689da5ba652338f6af4964685e45b9a6bffccdfe66819b7ef33141f0e5861d878e527ac862cfe02f293e42a9d138c3caa30f9bf966d0dc91e76ca01b9e37770c6c9575e15573928c054651ecf8ed2", 0xc9) readv(r2, &(0x7f0000000080)=[{&(0x7f0000001200)=""/213, 0xd5}, {&(0x7f0000000040)=""/7, 0x31f}, {&(0x7f0000001340)=""/217, 0xd9}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x4) tee(r2, r1, 0x400000000008, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:51 executing program 5: 13:40:51 executing program 4: 13:40:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:51 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:51 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) fcntl$notify(r1, 0x402, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x8, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYPTR64, @ANYRES32=r1, @ANYRESOCT=r0, @ANYRESHEX], @ANYRES64=r2]]}, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 326.484955] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:51 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 326.575443] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 326.683134] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:51 executing program 5: 13:40:51 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0xaa00, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:51 executing program 4: [ 326.825843] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:51 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0xc1, 0x1000}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x101}, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0xa11, @ipv4={[], [], @rand_addr}, 0x9cf1}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e22, @broadcast}], 0x3c) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x2, 0x3e, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000140), &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYRESDEC=r2, @ANYRES16=r0, @ANYRES32=r2, @ANYRESDEC=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES64=r4, @ANYBLOB="69796419e68f1eff77710fa670a4b093997d3834e3799f87c307d3914b0a9d78c33572cef1608f6f82a825af522243153d80ea13be0f35d7d46515369270d3a7d48414669f34fe0ab3b999d96ead30344659e0638068e9580fb61899cd4ae12efd36a186ba27c8c12f30d042a8588ec92f409a41654c7883b91185c62685502115f87ee883f33169ef8429e12ea46e4c2dbe550ed1c0e00990a01da4cb2a100b9f45ff76d500c9cf064354cfae09c6340322dd21e10feb50142560afdfc799bdab44ae76097172df6aeb10a387b6a6b47a9b0ec321d59ffae15afddccabd75c71756d91dde129948610ea05284f27e2f1fb42c51e3", @ANYRESDEC], @ANYRES32]}, 0xb6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:51 executing program 0: socket$inet6(0xa, 0x80003, 0x5) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:52 executing program 5: [ 327.029166] kernel msg: ebtables bug: please report to author: entries_size too small [ 327.033800] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:52 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000004c0)='./file0\x00', 0x80) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000280)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x220000, 0x0) accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x800) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000300), &(0x7f0000000340)=0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x2, 0x8, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESHEX=r4, @ANYRESHEX=r1, @ANYRES64=r0, @ANYBLOB="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"]]}, 0x80) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x10000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000400)={r5, @in={{0x2, 0x4e24, @remote}}}, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:52 executing program 3: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 327.158255] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 327.305005] kernel msg: ebtables bug: please report to author: entries_size too small [ 327.312163] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 327.381369] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:52 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000240)={'broute\x00'}, &(0x7f00000002c0)=0x78) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)=""/65, &(0x7f0000000200)=0x41) tee(r0, r3, 0x56fa, 0xe) getpeername$unix(r3, &(0x7f0000000080), &(0x7f0000000100)=0x6e) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:52 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:52 executing program 4: 13:40:52 executing program 0: socket$inet6(0xa, 0x80003, 0x5) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:52 executing program 7: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0x2, 0x7, 0xfffffffffffffffc) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0x7f) 13:40:52 executing program 5: 13:40:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:52 executing program 3: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:52 executing program 7: accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2f5d, 0x0) r1 = memfd_create(&(0x7f0000000140)='filter\x00', 0x3) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=0xffffffffffffffff, 0x4) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000280)) dup(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) setuid(r6) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x17, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f00000003c0), &(0x7f0000000300)=ANY=[@ANYRESOCT=r6]}, 0x8f) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:52 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800800}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0xec, r2, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xf48}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x800}, 0x40000) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000380)={0x0, 0xcb58}, 0x8) 13:40:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x78080000, 0x8001) 13:40:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000080)) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f00000004c0)=""/248) [ 327.872474] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:53 executing program 0: socket$inet6(0xa, 0x80003, 0x5) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 328.017540] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:53 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r3 = dup3(r0, r1, 0x80000) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f00000000c0)) 13:40:53 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x3, 0x301000) 13:40:53 executing program 3: socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 328.323614] kernel msg: ebtables bug: please report to author: entries_size too small [ 328.393361] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:53 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) readv(r1, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r0, r2, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:53 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eef4d4673dfe6e9f4c5036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/if_inet6\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0x200000, 0x0) 13:40:53 executing program 7: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) personality(0x400000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='com.apple.system.Security\x00') r2 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:53 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000880)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0xc232, r0, &(0x7f0000000780)="f8", 0x1, 0x0, 0x0, 0x2}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0xc0185879) 13:40:53 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:53 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) fadvise64(r0, 0x0, 0x1098f3da, 0x4) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 328.813739] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 13:40:53 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x9, 0xfff, 0x2, 0x6, 0x0, 0x7, 0x241843efa2ec79b, 0x1, 0x6, 0x1, 0xfffffffffffffe01, 0x8, 0x1648, 0xffffffff, 0x5, 0x6, 0x7f, 0x4, 0x7fffffff, 0x8000, 0x100, 0x28ae, 0x5, 0x0, 0x6, 0x10001, 0x5, 0x3, 0x23, 0xffffffffffff7e60, 0x52f5, 0x36, 0x3, 0x8, 0x100000001, 0x9, 0x0, 0x2, 0x4, @perf_config_ext={0x9}, 0x20, 0x0, 0x26, 0x1, 0xc9, 0x2, 0x80000001}, r0, 0xf, r0, 0x1) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000100)=0x6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r4 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000380)=""/191, &(0x7f00000000c0)=0xbf) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 328.890959] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:53 executing program 5: clone(0x2102001ff7, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 13:40:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) iopl(0x70e8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000400)="e5b1dfca419ae7809ad8e069332220fe59990f77498b716026fd049345d9070edfda43b432c597250e48f0a71638e0dd640f23a009732b5116c91054253ca3587a5add4f0a0d1b196fb038f5b68b27", 0x4f, 0xfffffffffffffffd) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000100)=0x2) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="968e35f9000f9f098dd8041b3d443ce7262a4c65c14c6766f44671ea8bf29be688677f6ffc4e1582110dbb54127d4990dd5da342f8cec050fad83962f8c90cdcefd7e21c450fc939a7faa2eb84ec0b62df5e16332c3b3f2d8ebf59134586f191ac44aad289", 0x65, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000004c0)={0x0, 0x1000}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000540)={r4, 0x6, 0x7}, &(0x7f0000000580)=0x8) 13:40:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000880)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000780)}]) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x5, 0x0, 0x180000, 0x20000000000001, 0x0, 0x0}, 0x2c) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0xc0185879) [ 329.220985] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 329.313915] IPVS: length: 191 != 8 [ 329.327162] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8d1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 329.360980] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 329.421930] kernel msg: ebtables bug: please report to author: entries_size too small [ 329.435343] IPVS: length: 191 != 8 13:40:54 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) readv(r1, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) r3 = getuid() getgroups(0xa, &(0x7f0000000080)=[0xee00, 0xee01, 0xee00, 0xffffffffffffffff, 0xee01, 0x0, 0xee01, 0xee00, 0xee01, 0xffffffffffffffff]) fchown(r2, r3, r4) tee(r1, r1, 0x80000000000000, 0x8000000000000) tee(r0, r2, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x6, @mcast1, 0x5}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:54 executing program 7: r0 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r1]}, 0x8c) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000140)={'ip6tnl0\x00', 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3e9) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) 13:40:54 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00b88e7b7a3ca8c56225ccdf2320014bb8784012f062f81fbf7e25fbe9b70d0a9f0db9929ddaff7c73ca75cc769d81c0b75a09fdbfa31b025f"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) r1 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0xfffffffffffffff9, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) syz_open_dev$evdev(&(0x7f00000004c0)='/dev/input/event#\x00', 0x1f, 0x400201) openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x37}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="31353c55a422df9f4f8600af8f1968830a7dfaef63271635a36fd9910500512c2700000000000100000000660630c202516e63da9b9d97ad86c956343abd5fea46d18fc8568792834c8f8054d5867039050000f0f6036d4642c732a9c2fffb00f77691567fac148932520f"]) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000540)=0x4000000000000003) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000600)=0xfffffffffffffe87) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) clone(0x2142001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r1 = socket(0x8, 0x9, 0xfffffffffffffffe) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000001c0)) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000100)=""/77, &(0x7f0000000180)=0x4d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={0x0, 0x2}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000380)={r3, 0x9}, 0x8) 13:40:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x0, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 329.922101] kernel msg: ebtables bug: please report to author: entries_size too small [ 329.933202] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 329.951633] IPVS: ftp: loaded support on port[0] = 21 [ 329.989162] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:55 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80020400, 0x0, 0xfffffffffffffffe, &(0x7f00000006c0), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$int_out(r3, 0x4147, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0xfd, "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"}, &(0x7f0000000440)=0x105) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000600)={r4, 0x6, 0x30}, &(0x7f0000000640)=0xc) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r5 = semget$private(0x0, 0x0, 0x20) semctl$IPC_INFO(r5, 0x4, 0x3, &(0x7f0000000380)=""/188) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000180)={0x0, 0xfffffffffffff359}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000280)={r6, 0x100, 0x0, 0x8001, 0x10001}, &(0x7f0000000300)=0x18) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000000c0)=0x4) ioctl$BLKROSET(r3, 0x125d, &(0x7f0000000100)=0x2) openat$cgroup_type(r0, &(0x7f0000000680)='cgroup.type\x00', 0x2, 0x0) 13:40:55 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 330.122002] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:55 executing program 7: r0 = socket$inet6(0xa, 0x7, 0x42) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x85, 0xfa00, {0x1000000000001, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7dc7eb2616021bdaef63271637a36fd991b185512c2708000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, r6) keyctl$unlink(0x9, r7, 0xfffffffffffffffd) keyctl$read(0xb, r7, &(0x7f0000000000)=""/18, 0x12) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000540)=0x3) r9 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r9, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x200000, 0x0) ioctl$EVIOCGPROP(r10, 0x40047438, &(0x7f0000000f40)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r9, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r11}}, 0x18) ioctl$SG_EMULATED_HOST(r10, 0x2203, &(0x7f0000000000)) 13:40:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:55 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x448, 0x288, 0x0, 0x288, 0x288, 0x0, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000000c0), {[{{@ipv6={@local, @mcast2, [0xffffff00, 0xff000000, 0x0, 0xff000000], [0xffffffff, 0xff000000, 0xff000000], 'rose0\x00', 'ipddp0\x00', {0xff}, {}, 0xa5, 0x4e22, 0x4, 0x8}, 0x0, 0x110, 0x150, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x2, 0x7, 0x1, [0x7, 0x245, 0x0, 0x200, 0xfffffffffffffffb, 0x4, 0x2, 0xd0d9, 0x5, 0x2, 0x948, 0x80, 0x2, 0x6, 0xe4, 0x86a1]}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x80000001, 0x1, 0x401, 0x2, 0x80000000, 0x2, 0x5]}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x43f5, 0x5, 0x1, [0x8, 0x7f, 0x1, 0x7, 0x8001, 0x2, 0xfffffffffffffff7, 0xfff, 0x70000000000, 0x3f642e1a, 0x80000001, 0x6, 0x81, 0x1, 0x81, 0xffffffffffffff81], 0x4}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x2998, 0x1, 0x3}}}, {{@ipv6={@empty, @mcast2, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0xffffff00, 0xff], 'dummy0\x00', 'ip6gre0\x00', {}, {0xff}, 0xff, 0x3, 0x7, 0x50}, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x10, 0xf6, 0x7f}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x10, &(0x7f0000000800)={0x2, 0x0, @multicast2}, 0xfffffe66) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000400eefcea8b7ceb484f0f6036d4642c732a9c2fffb00f7ae2309059736e37d00000000000000000000000000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:55 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:55 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 330.590155] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:55 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:55 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000000c0)=0x1ff) r2 = socket(0xa, 0x1, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0xdc, r3, 0x401, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffa}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4800}, 0x24044810) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x2, 0x4, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000280), &(0x7f0000000340)=ANY=[@ANYRES32=r1]}, 0x7c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:55 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x448, 0x288, 0x0, 0x288, 0x288, 0x0, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000000c0), {[{{@ipv6={@local, @mcast2, [0xffffff00, 0xff000000, 0x0, 0xff000000], [0xffffffff, 0xff000000, 0xff000000], 'rose0\x00', 'ipddp0\x00', {0xff}, {}, 0xa5, 0x4e22, 0x4, 0x8}, 0x0, 0x110, 0x150, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x2, 0x7, 0x1, [0x7, 0x245, 0x0, 0x200, 0xfffffffffffffffb, 0x4, 0x2, 0xd0d9, 0x5, 0x2, 0x948, 0x80, 0x2, 0x6, 0xe4, 0x86a1]}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x80000001, 0x1, 0x401, 0x2, 0x80000000, 0x2, 0x5]}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x43f5, 0x5, 0x1, [0x8, 0x7f, 0x1, 0x7, 0x8001, 0x2, 0xfffffffffffffff7, 0xfff, 0x70000000000, 0x3f642e1a, 0x80000001, 0x6, 0x81, 0x1, 0x81, 0xffffffffffffff81], 0x4}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x2998, 0x1, 0x3}}}, {{@ipv6={@empty, @mcast2, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0xffffff00, 0xff], 'dummy0\x00', 'ip6gre0\x00', {}, {0xff}, 0xff, 0x3, 0x7, 0x50}, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x10, 0xf6, 0x7f}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:55 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271635a36f00000000000100000000660630c202516e63da9b9d568792834c8f8054f584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000b40)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 330.969605] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:56 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x448, 0x288, 0x0, 0x288, 0x288, 0x0, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000000c0), {[{{@ipv6={@local, @mcast2, [0xffffff00, 0xff000000, 0x0, 0xff000000], [0xffffffff, 0xff000000, 0xff000000], 'rose0\x00', 'ipddp0\x00', {0xff}, {}, 0xa5, 0x4e22, 0x4, 0x8}, 0x0, 0x110, 0x150, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x2, 0x7, 0x1, [0x7, 0x245, 0x0, 0x200, 0xfffffffffffffffb, 0x4, 0x2, 0xd0d9, 0x5, 0x2, 0x948, 0x80, 0x2, 0x6, 0xe4, 0x86a1]}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x80000001, 0x1, 0x401, 0x2, 0x80000000, 0x2, 0x5]}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x43f5, 0x5, 0x1, [0x8, 0x7f, 0x1, 0x7, 0x8001, 0x2, 0xfffffffffffffff7, 0xfff, 0x70000000000, 0x3f642e1a, 0x80000001, 0x6, 0x81, 0x1, 0x81, 0xffffffffffffff81], 0x4}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x2998, 0x1, 0x3}}}, {{@ipv6={@empty, @mcast2, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0xffffff00, 0xff], 'dummy0\x00', 'ip6gre0\x00', {}, {0xff}, 0xff, 0x3, 0x7, 0x50}, 0x0, 0xc8, 0xf0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x10, 0xf6, 0x7f}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC=r0]}, 0x8c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660658a0cbd5fbac52d6d4537a7d857be130c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000c00)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:56 executing program 1: r0 = semget$private(0x0, 0x2, 0x160) semtimedop(r0, &(0x7f00000000c0)=[{0x3, 0x3, 0x1000}, {0x1, 0x10000, 0x800}, {0x2, 0x4, 0x1800}, {0x7, 0x3, 0x1800}, {0x0, 0x7fff}], 0x5, &(0x7f0000000100)={0x0, 0x1c9c380}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000a40)={0xffffffffffffffff}, 0x4000) r4 = syz_open_dev$audion(&(0x7f0000000bc0)='/dev/audio#\x00', 0x3, 0x40000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000d00)={&(0x7f0000000c00), 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x1c, r5, 0x30, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000a80)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r6 = socket(0xa, 0x1, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f0000000900)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x2c, r7, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x800) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d80300003002000000010000300200003002000000010000400300004003000040030000400300004003000004000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000"], @ANYBLOB="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"], 0x438) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f00000017c0)={@multicast2, @rand_addr, 0x0}, &(0x7f0000001800)=0xc) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f0000001840)={@mcast2, @local, @remote, 0x1, 0xff, 0x5, 0x100, 0x6547, 0x20000, r8}) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) r10 = dup(r1) ioctl$SCSI_IOCTL_PROBE_HOST(r10, 0x5385, &(0x7f0000000980)={0x91, ""/145}) ustat(0x80000000, &(0x7f0000000940)) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r6, 0x84, 0x5, &(0x7f0000000380)={r9, @in6={{0xa, 0x4e22, 0xf29, @mcast2, 0x4}}}, 0x84) 13:40:56 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af830a7ddaef63271637a36fd991b185512c2700000000000100000000660630a402516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd6a4a3dac264d0f96cf6971a90a647e431ae2309059736e37d00d37c4089171fdd04bf78b4d856b6f51807e246340f25d8b6b11d34908c9eebca35f5be50f73567b6000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000a00)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c00)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000800)=0xe8) getuid() 13:40:56 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 331.220737] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 13:40:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660658a0cbd5fbac52d6d4537a7d857be130c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000c00)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:56 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:56 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x7, 0x400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x2, [0x0, 0x0]}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r3, 0x47, "2a7c311cbc180dd5554e33a884d2910501bbe90e9498a8f196ae05db356df01b45a5aeff8f42bebec101de69337d7f8b7ffa85563f1115683f744b140ebf01765a634ce997d73b"}, &(0x7f0000000300)=0x4f) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000140)=""/115) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x0, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[]}, 0x78) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000000c0)=0x1) 13:40:57 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r1, r2, 0x2, 0xfffffffffffffffe) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:57 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) r4 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) fstat(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) r10 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000740)=0xe8) r12 = getgid() fcntl$getownex(r2, 0x10, &(0x7f0000000780)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) r16 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000980)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000cc0)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="814eaf57009d88c962bc456f8f222ef3370086d19ecf74a6c50412a7488a415f3b5e27483806968c3f0fb8815eadf1b17c90f5b60d410654207346b66517c7ecce8090d066443da02c9c4b590dced86af2d0ceb7139edbf6db7bea079525a5573102cf9ad4c9036eb4b782f201a3dbb08001cf0762a62a42dd098ff4edd984dcc4e81f790f327aa3595611758766cdc4c81d56cf405ef0e47446797797c36eb12f8f3875536e1b93c28e8825af5653444cd0cdb6f9c19deb821f39fb277fc657c5b30f197c614da0550e37d7c13af230021a18c39b38bca9a970a8c31d0763148233eed4464d6d85447d65325c82", 0xee}, {&(0x7f0000000280)="f0f90509d5c48ac36ca8937ac57940cb789c45b31aea26c7ee15c76b507db5e2e2d9945becb9939b45afc9c1a3ceb1e89929793abebda2ac5fe336b57005a81f225658c88744a19ad2dda9c906f79ea4fb8808384a0ad17ddc7594d19b2478bd5ca370250cca3419482fc96456f4caa46f8f", 0x72}], 0x2, &(0x7f0000000b80)=[@rights={0x30, 0x1, 0x1, [r2, r3, r0, r1, r3, r3, r2]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r1, r2, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x18, 0x1, 0x1, [r3, r1]}], 0x128}, 0x48040) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1e, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0x0) r3 = getpgid(r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r5, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a80)=ANY=[]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000540)=0x3) r8 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r8, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) getsockopt$inet_dccp_int(r8, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f518aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) ioctl$SG_EMULATED_HOST(r9, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000b40), &(0x7f0000000800)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xfffffffffffffeb6) getuid() 13:40:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488d") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 332.215426] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:57 executing program 7 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 332.267185] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x8, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x101) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000180), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 332.490418] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x200, 0x2000) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000280)={'veth1_to_bridge\x00', {0x2, 0x4e22, @multicast2}}) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)={0x678, 0x5, 0x9, 0x120, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x2}, [@nested={0x44, 0x47, [@generic="75844fa8d0c86c8965fb3c47b2fa7f605a619ec556b66bec28bd36b37c3ef52f21a550e157fc08e0734491fb8363871a1ddfb56f9dd4", @typed={0x8, 0x84, @fd=r1}]}, @typed={0x8, 0x3, @u32=0x1}, @generic="41922add1cee07e9bb454a997cf1d7f762075337cf9739184ed0f41bc8c3c8cccacf706718b1554e15ac7a9b07b75cc313f5719dc0a63eeea0d35c62713e24cbc4d401db80bc9b45439adc695622cbc4e460d070c796617ad5e679cfed2b332bc43e1456e86881dd8b7c457630d218eb1bb9f09d2896544cf9784043af1a9617dccc13045459677e1fde855d0cc1cc052ceff36a744b6dbe7b9cbe281d8912a07ed3ed3ee355ff8c80e215f192ae1609dade392749a12adead72bbccc361be3907e1d57909fc492955e3ad43f87500d7dbbf17501d0582cb8239b912fc1d399321bafd09", @generic="da72ba660df7020cdf690eba4551ce44900856e0d9bfbe6adf2f9a041926d0ed47865ee7caf8c869944086534d5e72608457ed46fb196b21be9a948b981e3f722db010c8820a35eb0628244a20799f595447fee6cfb12127b01047a4fdfe49112cb807acebfc1f6d674465ee6d53093d3e6156efe584ff81d576740e8da626999e86", @typed={0x8, 0x2c, @u32=0xf906}, @generic="1bc5a4515687189c9725d884d7a58c1829c36a232d2df23d1eb995ac81867af2b59af03feec2b4ace6bb9151bfd89568832685086bee9ad19cecae8775f07d743a8f8c5c54ee50f1fe2a370b9a4b51224e49bff50477cf4e1d40f1ab7d96335702294da1979caf902cd77f62a09cc2aa7cab055d7a8468e6182c60c04165bdd265421be93a2624def0a4fdbbc67dda2f819086d76894954060", @nested={0x410, 0x2a, [@generic="448900dab156b4789396dd7167299e0ed81d94a2a2f948ceef7ef2a80960694f9ad5bd024d1ea79d06482d72c0c36bb1847e3fc14551c35067d97ce103aefa6f430a5c5af2f984acef6bd75cf7e3ddcaabdd24e03fe76f7a6fb014ba474b42146280dc1c6af309f16f", @typed={0x48, 0x2f, @binary="d61478583407fd574e8f2ff72f0873fabaffd9465defd014805fd49fbf327c424736663839a78294b65149468044833a1dca3904bb66ad46527aa716448c78875377"}, @generic="8f003de5619cc1187b23a784be118a03f33f18cf2f79918b0624db9a95faff5ec4df338f4c843168c34b3c17b8e1a3575750817b4cf6c8734d6e7f1a83aa2d82499e9140c98db93d0e9f3da9021f505524b8fc90265a9498b9628f83a633906e8b8fb4160488e49c189442167d15b4afdbe780fe88726f2494eba4029355748776c6069851ef5e6fcaaa4f2d08cbafab1a5fa2e57544354dbca17dbcdf4ae7caa709d6f81a92776962ca1d970eeff838fd7ae5ffc16f708c35db203671b1f2efc121e1772899ffebc523225403cc80041f041cc4b6d394e69d5b", @generic="602f364374d09656d548ae4cd8a3dce6bdba208a9afc1528f544adab0b9f187a400ebc548173eaa4d02f2ee1249e5fd84ed510f3b9c4a7088fcab4559add3d303f9704f5a8da090e1d3b4638eddf6ceb55d394c64805b997b772cc395f38ea9f2dd120cb91df0dd8a0e518644c98b6261df67fa498e85035ce04898b2cdf2f5580b683ac27e24932bef74329e6390ee646cf5219073aba747e0d4c8330c0a3d6bf7b7282412a9ce8c29894028490a1be5ad24fb7f8568c70ba84f3b02b84199ab0ac6f31aaae21baf6ad7ad7bd7c2e1293c37a61857a3e22b9a05087f66cc09057bde7b7ef23ee602abe0a62f3dd6d54184ff838ee94a13b", @generic="6a05e567a5c61ce7de9be52073b042d8f0f9b66f317c0c1fa11ad1c87a34a0f48c71b9e3c456372ad09f5444606a0aa62e8727090b83317e7ba4f9fba2ec99540723fbb2d83082dd0e4a0753d600bed2275054dc16779c87d40a2939ddaedc6dc27b3516d3248f7b165bfe5703de38b750747c0324a4e837ce11e459b5eee57291eca0", @typed={0xec, 0x7b, @binary="80ad32b09d40df83a9c3c5f611c2c449fe670580cf08e5a494314d97863ea5e7d098bf4879847a16d2c203bc7792b036e602829f144bebdc1ced4838201a29f79293eed58739ea05d0282e3bd57c4e8f67dc67402262a2024e09159b7ec60656b9e5c90de9d6450699cf38edab61cf4f53f606f571c2c9a0c5bf3e87e6909904142eb932ed335571374780815b65a8feff7a6eb595ba1946b4287812eb5af29d03beaa08c7d2bc8e35a4b59e15b3d0f73f814ebe99bbfe73f2a05c1c2295a2d85f782a78fe7e5935a1e12b0ebd276be65c2ea4884c3c46addffca5a17f0f265d294665571bd3"}, @generic="151370274c478ce3c2ef8cf64332603cb941fc892ae51dc6962f"]}]}, 0x678}, 0x1, 0x0, 0x0, 0x800}, 0x4000) [ 332.563958] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x6, 0x20}, 0xc) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f00000000c0)="33c0efb3") ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000040)=""/52) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x80) r4 = getpgrp(0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000200)={[], 0x5, 0x5, 0x69, 0x78, 0x1ff, r4}) 13:40:57 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000000), 0x142, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r5, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000540)=0x3) r8 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r8, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240), 0x13f}}, 0xfffffe78) 13:40:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488d") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:57 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000040)) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 332.776994] kernel msg: ebtables bug: please report to author: entries_size too small [ 332.876417] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:58 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000240)="f18f3d01454d98136c368cd1d6068b1963c5b0ffe42c8ea0bbdae1efba1b94e87086b76bd402fd269fac8a20050d239e5d48cc9923c2c7e9c8395c063471be50ef27b41aa0c3bf896b7aaff81900e97e3489ecc748d8710bcb8526", 0x5b) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x4, 0x80000000, 0x1, 0x10001, 0x3, 0x200, 0x400, 0x3, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r4, 0x2, 0xfffffffffffffffa}, &(0x7f0000000200)=0xc) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) pwrite64(r0, &(0x7f0000000080)="2b0aadd3fade09e2adca95f09c8480ad0c9eeeaef98c6a7404a112291212548a11c42e91b785f310b318803e9c3a7932de4e16759ecb329ca9a2341709e2be919678895932f1fc62ca60164461c53f0c342d262311", 0x55, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) 13:40:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1e, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0x0) r3 = getpgid(r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r5, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a80)=ANY=[]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000540)=0x3) r8 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r8, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) getsockopt$inet_dccp_int(r8, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f518aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) ioctl$SG_EMULATED_HOST(r9, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:58 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @empty, [{[{0x9100, 0x2}], {0x8100, 0x40000000000, 0x4, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 333.311299] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:58 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 333.361017] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:58 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000000), 0x142, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r3 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r5, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000540)=0x3) r8 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r8, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240), 0x13f}}, 0xfffffe78) 13:40:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488d") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 333.652162] kernel msg: ebtables bug: please report to author: entries_size too small [ 333.729455] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000500), 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x10001, 0x10000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000300)={0x8, [0x101, 0xffffffff, 0x1000, 0x7ff, 0x80, 0x7, 0x8, 0x4ccf]}, &(0x7f0000000380)=0x14) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) recvfrom$unix(0xffffffffffffff9c, &(0x7f00000000c0)=""/207, 0xcf, 0x20, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) 13:40:58 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x140) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="2565b2b11ca24f9569582cdd82c58d2a", 0x10) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/14, 0xe) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1f7d7d0b1792a074) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000300)={{0x7f, @rand_addr, 0xc44, 0x2, 'none\x00', 0x8, 0x84e, 0x71}, {@empty, 0x4e24, 0x0, 0xff, 0x2, 0x3}}, 0x44) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) r4 = dup2(r0, r1) ioctl$sock_ifreq(r4, 0x8994, &(0x7f0000000280)={'eql\x00', @ifru_addrs=@nfc={0x27, 0x0, 0x1, 0x6}}) signalfd4(r0, &(0x7f00000002c0)={0x6000000000000}, 0x8, 0x800) 13:40:58 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="ce8347c478b6743bff1bc007ff33f78be6e2f9230df282fbf11a489fbbc4c777a7ca3cf3c2a03cc3c31cb907db1128968d1c1f18eca10880da98ab023f2f42ffe7eb32f9367eb8795bd3e9bb77ddcc2a306221ca6655ebfebe4aa781f06a988811d0723b3ff91628eaac75e189bb92a0e0446ccfcb957fbbc5225031e09fe0e3516157c696a78ba3aecb10b7ce727b038e83f5f708af3433bf3e2fef50550557189113762916f3cbf3ea5b116ffece9f2c7587e4136a9c626a66b6b85407b13c6f09501884654f84570aeb67567cdf2a99e8baa5f47c61eb3a2c4e3139834a0401d451aded84541909bb45b9470719ee2e668b92647f519c117207b7f2938120c94b7e08a3e19a6d70b241bb44b1cf842b986634fb23d375f325102d86d1e46e7d8c000b296f8f7feac89fe3c7b5e8b65fcdfb34dce7dce9d0bd74f7dfa2c1b9be848d07d6a9d9a8d21b1c09fea03f30f62cae12c86eb2c977302e1ef38ca4ca089d1c48cd34b8985526509711826fb73b01cc71c8dacef6ea110ce57d22a5383390106cff73c36f9d8253a4b1db2367243bf21e76eb53f62d17d45fb01a0ea410d61b83ad4ccefc6c3680eea1a58de20a443c7b7a16387b3254d13a709408b0a9ea2509417a7174ecc6995b744b36d613f35ba31abccd309d71f240891be711955a102fe68ba6f6c00fcae3f522a4b560e53deba5768cbe77887997d425a597bfba08ec97d1dad390c3a32c52a1911412564b327924efda81c61cc3454734f38a5f00389424263a266bdc0d3fa50b174015644024f42c9aa6fdda71369520cb7da9816ef6213d9c84211a11bf1fa1a3fe9087084da3169821975ee3766e4d0db33df026c93ca9b2e538372d51ea188bad01c0293b502fa9b29ec60c5cd9fa178277f58f11059d9113a418e8f6a6b9335452a9fc0d08f49e07498493d4f4db0b525734289c2f64aec917d24c3c7c443f0731a181d8984b8d4614b77159392d9fb27c807b75903e2328a8355bf60335e8f515baf09ec13536973df879fa542f88376bbaf14aa6607bfcae29c0b3051e75948b5218df1bbf6635f0fe1a39fb79bc46735b660199427fa9d29ae995a2c5d20d469f1b5733344539477cf73304de011e636ecf97c9a847e56d2d723f2471cedc4405f5b4f5106066759d15908aaa0cec91c352c5790d3656ebb622784f834e31083ce5ee47bd4e0f8cd80ca4403f6aee7c982beae811874b6353a29446f278a61972eb4a9cb29cd8f565beff36599517ae0de998cacf1a7252828ec2448f5ae47eacd176eeef6e4f879cf78ab85f78b7e25a7fa6e7b1c6b9235283331325d1370069fd974ff9dcdff835c6d8e0474ddc237a6eb69030a1b497acc9f4c8f169a17fed495543872934358db37d9c3c68790582ba646230d3b8eae2aa551ebc53c32a8931dd9d9c8d93d00dd9dac1aa2e4cb00eff65ad182c9db6df9fc0c6dd840183eed67c391574d47b0d0a7e9e536ebc324fe095c8a8210cd2a2f0436adaf1f47906898c65f946b9d7adb78e27360729ec74eb815becd16f3058923735400af2297c68c8513885bfd0838a471ee742093af5d3b7c81b4e12b2b92bad365552c03aaf114fd9c3934d672698e9c93a7dd8a751061070d6d808b403a5640a4e99aa7cee32dec56576174cc3b823e2100c0365eca2f3b48a748f69985b172b5b5e083eeba823bc7fd25e1807c8f28121d80e272733394002de14172587b0f06bf44e9d4cb5bfe53ae33f7aa408a2eedf73e0960eff4ff3d59acd4d1d845937cf90bb22018fc25901371c3d7db69f302a0eaaf8532660424c65a5661c49561f00b15fed32e797b03a5f40552838d9ed66900182fe6467bb5c3d1d09d6030eb38648837723eea2cbfe3f5e044c9d4572f2125caf6b502fede0f6f4e29861bcac9dcb927b05530740c221c16d4b928eb1f1877e4d8f7e020ad1e25859b9182d0cf0f488a8554c06eb0d54958faaec2f8b3774b52f0a46dbf821a8007ada66bd5b9716c2dd9d06fc21d03d4ea5c994300e173a2b6eceb4abecfbbb62cd6e3c08a6304215404bdbeab103990068753d9c569549dba169d5903443ca36b1ba9b0fe5fac8f2811371cfecdddad47ad524be0a8583a35b87e5808f00ac35c109664d3248c4f18d6884ed3e6124216a44a83cb9b0867315a2a777741fbb5b6ec1b1cac401610f14f5ea75591e2c5eda2cf5299e6cddd5da5ce878c851eef6ec1e1c00ca56070feecc54a7eee59173aabd549f4a1c004e05328850d29eb72a41aea1bc02c6b63ce6e048eecc7b74c701bb722266dae97ba07a6a011f6d5fd8a00d0b586c35f30a6d240cb7177fa55d656338b6817bad27d789eb14af0d1a273880ed57097d2bedbbb997acd53eda80ae31688df363c00337c91e61e8f2406ea63801c971190963a8d79705e471ba8ce558b65aefe93a7c0b1303a305ff164bb9932373f1a956848ab3b9af54c890325c49a3654962d26f438824e2a6c5e58fd720392f0ca330ff918d65aae60517f9f97a2c485d3e4c2ade305b3978b3f18ebac55cd49717b9c45ebdc564f6467ed36237b332eb9c108936472f2a773833438362dce69593bb7a22901bceb2ab91699bf5c10ae03d379d1eee1c477d88b2de912e168c6edad8224f95f4e15209baf5a7f74dd1e61071ae8f0c408a3b3220dae44a129223183ad6ae88121b3b7eadb400d8e6f9bffc367609d18bc814559caf346971ec3dc9fe244ac52bb713ee6b1e73d5c560491bdada590ce9848dcb33bc180fed142bbef53c088bd05f230ab4aeb939c6b2bbf89756f326d9a1d6c6c91445fe86c34be471e2d2571aeeb15a94a5f5a6c2afaa655e868ed18eb1d0fdc80b0cc306fffd6024b00c4a8445b2e3138a596b51484647cf9fcd463952a6a167e5673582d3799f548c75b91a0d3c12b35904f761b36ae1f35a2e344efaa7c07d308dfe46982cb48e919ca8171c07520cae19a820e66c183616020710aace5fe153720142f353a42fc505a3dc5ba9a2aa1c23396acf3cf44eeec4f70c69010d6529b659c111d2482085a479829aa96790fb06d974b0fe01ee14329600da6c2a759ad31dd9b150c60c25425d7979ada6c8466c8808bc093d170456d216fd56cb18adcc1492c8260058c0bba1fbb5ff019234788b3254ef143a96b7738cefcc83e355bbc59232e7ae02047b00def0217c232f777eb5073ef80b496cbe6cc9fccb81cc25e3fdcc2cd6531a3f257d63efab7e773c7551fa62be635b7a2bab6d38f351bac25a34c2624fab7876644b1dc4602d4d3d1e9072bcb31c60a0785d200c525d6ded276b525cc0657d0de7e3a3c238f2d979316390fbff23d21ac18abde1ede1e4cf53d82d8a9d17c8a467b2f6afe558dacd9f499f329fce0ef561dc550e9b3064e27f0e02e7f5b9adac8a5c03b07fe0c7606a8badaee3d156cdd3a4f9d2ddab145de3c00943b97c10a54e65b286fd93108f9427baee88632a145ea5f6026084597583147797e160679a4bb4680711c0c0a41ae679d898aee7cdfc2c36e720dc767f8a1d566d2aebe81ec98ec86e7a38e32ea2be512f1e250bd606c9f345bd2b5898e96af3d13d1d560e987580b867e9f4a2eb4347e807b1ac2628a90b2e226896872a8a7cb958fa6ce74a8bcf77eca10bf3890cf0bbf9a69e9f4f0622e48d75734cc3e2dc562e96efb7ba670f7aa1f75314b0d616b8bb47f34f9c98b4a08b43ff9c803160f020b0301c9f063da0f5773a4f219b1e745a3ce50edeba589817cbbf105073c23f872b44c8106e1967c2f5355c433278e3da50e7e1fa8503c32daf6ec5a703b8623d756efee4efac4cdf8cc4bd7eca2c2279d07e18b6f8331167500611d1887a5e1e4d69cef0b94f98ac7da793e052516ce5cf255fa7b5b5766c3a7719662bb9c1f81e52614f96d69e771ce250f43b1c585b3f1d7f1fa4fbf2e3150b0007540f173b446769508077990e0498e0a1a67331e94274292596cc4cd114b60935b36a4741c86d4e22dda90cc157e022ba7f7a90f3efb1df733a58535a415dd085bbf49ebdfe219f7e40279f08bdedf101cb20d4627702ad248463dafb6d1c37117d03ed0cd58619cdff88601f037f75ee7b931f547b2a5cc80c3f30f2af3a9584e4fd6e1fd2b24a5afc7eb9c66509dea1c22f755ce7ccbd25307b6bc42fe25dc7968f3948585ecec59e473cb606299f2937feb8850f8f2f89a1d1992dc35b1795ab55c9394175e6caada8196a421ea55b71ba1a2d2c43caaa45c7eac9116027a1e23a4726927bafbbaa653456349ae2a514da9c934feb26064969b3498b79c610fe7ed5d46be46ce4d12bf886f4a5a028c143977b6658c60f4682d71e677a1bf5193d559150ddc0dd8e9ddd0c92b9d0f0ae8c02f62995697b58c5cae837d76b3f11eca47bdb0d7b6e3ca8d38b3e6f008fd6eb13c4c9d528687186e5ca6055d65cf59c5ef2b9869a23a43dcbc4f010077b59660b9fb9fcaec2d82eaac8b58aaa006a34ec19c06375e898842bd1fda2c3a2749ff714bd7202507ce00c2e3ab1cdc07d195e0c4b9e872534ab1c6318439334dd4f4a803ca7fa677a3fd37fb6a3aad089281e68b62c2f36c642c61168127db2b41faf051f5053a02245c0e529536e191db1414672f55339c4ac89dfff6da35a1ac615980d747634bf6e92e4c4f941e55d761711014ed016b395483f0d49f8913c20f8a652849a6418e393498d057729a32061e5e435497f5fdf2f55c6fb5a6e47852224b6b0847593040a1784ab20fca96f8420498ae50051f63ce6cb87cba75c6948e3995b2c20692e8ce8973f77549eee27572b3325a8df0b94e96341f77ccf2685a066e3ab30eff00fe07bfa45bae5a1a7d30c071e8c6ce4ef02a9d745297afa27dbcb9fd6af40ebdf6d2ecd287e97135df6365df042781be8c91b2bb398e0527cd50ef9c30b880fa78a8050551037ca5b20075574faefdb5ed6ff2c912564a87c9a9313f43b75f634754bfd9761b0223e82b869aa4f1edb0c26ee08f43148930d29122f1a84b42f71b9c25c353ae9540e6df6dc3a147cfb25980e642279e315fc26a131d772e74cc30b9b24dea3e6065a3a1b384e470d324dd5673360e8e3bd4e8e28afe08f4749a941b5ed9c3da88eabb5a0666b2fdac85b3fb2665034d64603d40c6f912e69053fc8609297c925323db4c8053ffe4b62b5808e3867399736698eaff1436c2bb729fc647e3610ba24b7d67d27c13aceccfda19a4ceaf346e897d0687683775236cd26d9151756151e7603e9470e125813771ddd2e5cff6aaad726cb5ec561c85ee6481ff288a8343f44355ba81c684954d4989a88cbaf764269141cb6184d289aa31361a92cfc5950c23cfd08fb8cc0a1c831180ea00c00a836fcf4baba27302a0946d8bbc8724aa79f58c899554f2fd0938afd5590128a33d44b15f144b5534f7bdc3cb835aca1027eb352d0689eb4ae5e2b1e19d793c3960c798a6fd8708dce177728d64c7e9a2503c1837ce9a43cd129a8af5948b703bd27b929179b2b9d6cac2038f44baeabed570423dd8644c4b1454c125823d4ea1ed88f38626a58e2deab428605610b59f81c4ec3f971a24b5b0deff7beec7e96dc496e86029d543fd9e4824cba489463cb09e15b4e76d56d8e1d99aea5bc73bf5e02105e16677741e4fc0e5c5483fbed9102035af007a56c5c484989166f57cebae0ab1907d90b5958355092e043b1511d16761c3b428531179c4deba6d3a6f7812b8edcd4b73c789f0ff7ff418d371f5d9e6d5ae5fc334218f424728b53a9c4c67cae51", 0x1000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000080)="65c8dde553dca08aeb3390b2267b08cede99551e9c11c7470cde95e924a929b57a88b50218c4e334bef74c99f4057f1d079512a74e16f19e009dd4ad8aeb05e494310b122b1d96632c1726c305bb855b6d2fc4", 0x53) keyctl$update(0x2, 0x0, &(0x7f0000000180)='(', 0x1) 13:40:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 333.995097] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1d, &(0x7f0000000280)={@mcast2, r3}, 0xfffffffffffffee6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000004c0)={0x8, 0x120, 0xfa00, {0x2, {0xfffffffffffffe01, 0x6, "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", 0x91, 0x7, 0x17a0, 0x3, 0x400, 0xffffffffffffff01, 0x0, 0x1}, r4}}, 0x128) r5 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) [ 334.272402] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:59 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:40:59 executing program 7: socketpair$unix(0x1, 0x4000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x404c00, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000000c0), 0x2) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:40:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d76") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:59 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) setpgid(r1, r2) clone(0x0, &(0x7f0000000080), &(0x7f0000000240), &(0x7f0000000200), &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) 13:40:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10, 0x800) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 13:40:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:59 executing program 6: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000800)={'vcan0\x00', {0x2, 0x4e24, @remote}}) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271601000000000000002c5d2fb23f2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea2435be047b5a9fb9a9a3e25ff84f0f6036d4642c732a9c2fffb00f77691567fac148932520fd615"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:40:59 executing program 1: rt_sigprocmask(0x2, &(0x7f00000000c0)={0xeff}, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x14, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f0000000480), &(0x7f0000000340)=ANY=[@ANYRESDEC]}, 0x8c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) getuid() setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x3, 0xd00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000140), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x8, 0x0, 'erspan0\x00', 'veth1_to_team\x00', 'dummy0\x00', 'ip6gre0\x00', @broadcast, [0x0, 0x0, 0xff], @local, [0xd378b6005010e93, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa0, 0xf0}, [@common=@redirect={'redirect\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x4, 0x6}}}}, {{{0x0, 0xe, 0x88b5, 'rose0\x00', 'veth1_to_team\x00', 'tunl0\x00', 'veth0_to_bridge\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff], @random="fa0995333f54", [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0x8f0, 0x9e0, 0xa18, [@u32={'u32\x00', 0x7c0, {{[{[{0x5, 0x2}, {0x2, 0x1}, {0x3, 0x2}, {0x52e25809, 0x2}, {0x6, 0x3}, {0x0, 0x3}, {0x0, 0x3}, {0x0, 0x2}, {0x4, 0x3}, {0x0, 0x1}, {0xffffffffffffcd47, 0x3}], [{0x3ff, 0x8}, {0x4, 0x1}, {0x50, 0x6}, {0x2}, {0x2, 0x401}, {0x20, 0x7}, {0x6, 0x80}, {0xd82, 0x6fc0}, {0x3, 0x3}, {0x3, 0xfffffffffffff800}, {0x7, 0xffffffff80000000}], 0x6, 0x8}, {[{0x80, 0x3}, {0x7, 0x3}, {0x0, 0x1}, {0x81}, {0x401, 0x2}, {0x0, 0x1}, {0x10000, 0x3}, {0x5a, 0x3}, {0xfff, 0x3}, {0x3ff, 0x3}, {0x1, 0x1}], [{0xc2b2, 0x5}, {0x5, 0x5}, {0x5, 0x80000000}, {0x800, 0x5}, {0x9, 0x3}, {0xda, 0x1}, {0xffff, 0x7fffffff}, {0x100, 0x3}, {0x7fffffff, 0x8}, {0x2, 0x7ff}, {0x3, 0xb739}], 0xa, 0x3}, {[{0x5, 0x3}, {0x100000000, 0x1}, {0x9, 0x3}, {0x10000}, {0x6000000, 0x3}, {0x4, 0x1}, {0x9, 0x2}, {0x0, 0x3}, {0x0, 0x3}, {0x1, 0x3}, {0xffffffffffffa5f6, 0x3}], [{0x9, 0x5}, {0x8, 0x6}, {0x5, 0x1ff}, {0x1, 0x1}, {0xff, 0x2}, {0x8001, 0x1000}, {0x5, 0x3}, {0x4, 0x6}, {0x1, 0xb6dc}, {0x401, 0x7}, {0x1ff, 0x5}], 0x7, 0x6}, {[{0x12ae}, {0x0, 0x3}, {0x4, 0x2}, {0x9, 0x3}, {0xe6}, {0xf1d}, {0x8, 0x2}, {0x7ff}, {0x5}, {0x1, 0x2}, {0x20}], [{0x8, 0xffffffffffff0001}, {0xd4e5, 0x6}, {0xfffffffffffffff8}, {0xfff}, {0x8, 0x6}, {0x3ff, 0xffffffffffffff6d}, {0xfff, 0x3}, {0x2, 0x10000}, {0xc66, 0xfffffffffffffffe}, {0x72f, 0x9}, {0x7fff, 0x4}], 0x8, 0x2}, {[{0x2, 0x3}, {0xfffffffffffffffc, 0x1}, {0x0, 0x3}, {0x1f, 0x3}, {0x1, 0x3}, {0x660}, {0x4}, {0x9}, {0x1, 0x1}, {0x0, 0x3}, {0x9, 0x1}], [{0x7, 0x1}, {0x2, 0x80}, {0x0, 0x2}, {0x5ec6, 0x1}, {0x8, 0x34cb}, {0x4, 0xfffffffffffffffc}, {0x9, 0x5}, {0xfffffffffffffffa, 0x9}, {0x0, 0x80000001}, {0x1, 0x10000}, {0x8, 0x56}], 0x9, 0x1}, {[{0x1b, 0x1}, {0x6, 0x2}, {0x7, 0x3}, {0x200, 0x1}, {0x8}, {0x2}, {0x2}, {0x4, 0x3}, {0x0, 0x2}, {0x7c3, 0x3}, {0x4, 0x3}], [{0x4, 0x8}, {0x100000001, 0x31}, {0x100000000, 0x1}, {0x7f, 0x3}, {0x1, 0x4}, {0xfffffffffffffff8, 0xfffffffffffffffb}, {0x896, 0x1}, {0x0, 0x8}, {0x3, 0x8}, {0x9, 0x3cb}, {0x26f95cd4, 0x1}], 0x1, 0x3}, {[{0x9, 0x1}, {0x1, 0x3}, {0x80000001, 0x3}, {0x5}, {0x100}, {0x40, 0x3}, {0x0, 0x1}, {0x9, 0x1}, {0x7ff, 0x2}, {0x7ff, 0x3}, {0x1, 0x2}], [{0x101, 0x2000000000}, {0x8001, 0x8}, {0x8001, 0x9}, {0x0, 0x81}, {0x7, 0x3}, {0x7, 0x80000000}, {0x1, 0x3a}, {0x10001, 0x8}, {0x101, 0x7}, {}, {0x7089, 0x6}], 0xb, 0x2}, {[{0x8000, 0x1}, {0x8000, 0x3}, {0x2ad, 0x1}, {0x8, 0x3}, {0x1, 0x3}, {0x1c8a0000000, 0x3}, {0x2, 0x3}, {0x1f, 0x1}, {0x2, 0x3}, {0xfffffffffffeffff}], [{0x8, 0x6}, {0x26cb, 0xffffffffffffff00}, {0x0, 0xa3}, {0x0, 0x7}, {0x9, 0x8}, {0x3, 0x100000000}, {0x100000000, 0x7fff}, {0x7fff, 0x8000}, {0x0, 0xffffffff}, {0x5, 0xfff}, {0x4, 0xa49}], 0x0, 0x9}, {[{0x7, 0x2}, {0x8001, 0x3}, {0x1, 0x3}, {0x800, 0x3}, {0x7ff, 0x2}, {0x1, 0x3}, {0x1}, {0x6366, 0x2}, {0x1f}, {0xffffffff, 0x3}, {0xffffffffffff9b35, 0x3}], [{0x7}, {0x6, 0x1}, {0x3, 0x4}, {0x9}, {0x0, 0x80}, {0x9, 0x5}, {0x69b074e1, 0xffff}, {0x20, 0x8}, {0x82, 0x836d}, {0x5, 0x9}, {0xfffffffffffffff8}], 0x4, 0xb}, {[{0x5, 0x2}, {0x5}, {0xf3a, 0x1}, {0x3}, {0xfffffffffffffffe}, {0x100000001}, {0x7, 0x3}, {0xfffffffffffff001, 0x3}, {0x100000001}, {0x80000000, 0x1}, {0x0, 0x3}], [{0x7b, 0x6}, {0xa593, 0x3}, {0x9, 0x8}, {0x20, 0xfffffffffffffffd}, {0x7, 0x6}, {0x7058, 0x7}, {0x0, 0x2}, {0x9, 0x3}, {0xf67, 0x2}, {}, {0x1, 0x80000000}], 0x4, 0x8}, {[{0x58}, {0x704}, {0x6, 0x3}, {0xdb44}, {0x20}, {0x6, 0x2}, {0x3, 0x1}, {0x5, 0x3}, {0x7, 0x3}, {0x1000, 0x1}, {0xfffffffeffffffff}], [{0x9, 0x1f}, {0x5, 0x10001}, {0x7ff, 0x1ff}, {0x5, 0x1f}, {0x6, 0x5}, {0x80, 0x10001}, {0x5, 0x80000000}, {0x6, 0x6}, {0xa65, 0x9}, {0xffffffffffffff80, 0x101}, {0x9, 0xff}], 0xa, 0x6}], 0x0, 0x1}}}, @physdev={'physdev\x00', 0x70, {{'team_slave_0\x00', {}, 'ip_vti0\x00', {0xff}, 0x1, 0x2}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0x800, 0x4, 0x80, 0x0, 0x0, "81fe98206e1a5985f7855cdd1e60ef0b256e14611727320fd2cbdbe97835ef2628c8163f1a6467c590cfc15a88997658ebaa7c968b4ee7aab42f0d0c1c858860"}}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0xe26, 0xc7d, 0xce7, 0x0, 0x0, "87d970bfd0d0589d5717172a75952f87c0e08537c146c3390ae6585a478e2db56089bdfa7b8afaf19178c50e7e1d9fd17d13696dafad56b4cf7d6be59ad90e61"}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@random="79f818ce2b3d", 0x10}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x5, 0x2, 0x800, 'erspan0\x00', 'veth0_to_bridge\x00', 'bridge0\x00', 'vcan0\x00', @dev={[], 0xa}, [0xff, 0xff, 0xff, 0x5d5ab3a7e77a6bb7, 0xff], @broadcast, [0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x118, 0x168}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@nflog={'nflog\x00', 0x50, {{0xe0, 0x0, 0x1, 0x0, 0x0, "0d20d7bdbd99ab635c50326f597bb610c189f2cadd6fc89a915fce9fa076b33389e32a29f34fa97fa9b3b8b95ce423cf0256695be6d44cc259487ebdc2ac3681"}}}]}, @common=@log={'log\x00', 0x28, {{0x9, "40b72fa2b1b2e8608524c086cf7195ffc87781b1e4c2016f553223be7fcf", 0x3}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0xd78) [ 334.353865] kernel msg: ebtables bug: please report to author: entries_size too small [ 334.522758] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:40:59 executing program 7: socketpair$unix(0x1, 0x8000000007, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 334.618617] kernel msg: ebtables bug: please report to author: entries_size too small 13:40:59 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4002, 0x0) r1 = shmget(0x1, 0x3000, 0xa00, &(0x7f00002cb000/0x3000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/146) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1809000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff97]}, 0x48) r3 = fcntl$dupfd(r2, 0x400000000, r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000100)={{0x200, 0xfffffffffffffff9}, {0x7, 0x5}, 0x1, 0x0, 0x5}) 13:40:59 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) setpgid(r1, r2) clone(0x0, &(0x7f0000000080), &(0x7f0000000240), &(0x7f0000000200), &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) 13:40:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d76") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:00 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/1, 0xffffffffffffff6a}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x220000, 0x0) 13:41:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:00 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/213, 0x10264}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0xfffffffffffffc2f}], 0x24111321ec21132) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:00 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000800)={'vcan0\x00', {0x2, 0x4e24, @remote}}) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271601000000000000002c5d2fb23f2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea2435be047b5a9fb9a9a3e25ff84f0f6036d4642c732a9c2fffb00f77691567fac148932520fd615"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:00 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000180)=0x84) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 13:41:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:00 executing program 7: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@un=@abs, &(0x7f0000000040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', r1}) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)=0x3f) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RCLUNK(r2, &(0x7f0000000240)={0x7, 0x79, 0x1}, 0x7) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000003c0)={'veth1\x00', &(0x7f0000000300)=@ethtool_flash={0x33, 0x0, "d005d06385b913674b2321cd30cc9584aedcdee888bc00b0532102c107688d6bba7bda981091c1693d5deffa9c949b85b84c412a495277565130fe9720e96b28085db561276c13b3f58363a4968fd6c1c1bfa6e312fbd01fac5afb566a4a3acbc8af55ac10ffefd5970bca1b838d1c65e15c90912a2c39977152f034182f0264"}}) 13:41:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @local}}}, 0x88) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000080)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={0x0, 0xffff}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000002c0)={r4, 0x8, "694f68603d0a321c"}, &(0x7f0000000300)=0x10) 13:41:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d76") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:00 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd9b0b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584702b05000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d003e5a7214006c4810ca6dd030a104cf0a"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000800)='./file0\x00', 0x101004, 0x20) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:00 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:41:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:01 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d7660") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000800)) gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000900)) r3 = fcntl$getown(r1, 0x9) r4 = getpgid(r3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r6, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000540)=0x3) r9 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r9, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r10, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r9, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r11}}, 0x18) ioctl$SG_EMULATED_HOST(r10, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:01 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f0000000040)='./file0\x00', r2, r3) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r1, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote, @rand_addr}, 0x6) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r1) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f00000000c0)=0x40) close(r1) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r4, r1, 0x0) [ 336.454586] FAULT_INJECTION: forcing a failure. [ 336.454586] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 336.466754] CPU: 0 PID: 14475 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #41 [ 336.474066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.483460] Call Trace: [ 336.486112] dump_stack+0x14b/0x190 [ 336.489787] should_fail+0xa98/0xaa0 [ 336.493572] __alloc_pages_nodemask+0x5db/0x5c80 [ 336.498379] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 336.503798] ? update_load_avg+0x6c4/0x1a00 [ 336.508180] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 336.513678] ? rb_erase_cached+0xbe3/0x2c60 [ 336.518069] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.522994] ? __msan_poison_alloca+0x173/0x1f0 [ 336.527748] ? delete_work_func+0x217/0x290 [ 336.532152] alloc_pages_vma+0x1578/0x1830 [ 336.536453] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 336.541683] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.546627] handle_mm_fault+0x4377/0x81b0 [ 336.550959] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.555882] __do_page_fault+0xc8b/0x17e0 [ 336.560149] do_page_fault+0x98/0xd0 [ 336.563944] page_fault+0x1e/0x30 [ 336.567537] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 336.573205] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 336.592147] RSP: 0018:ffff88001bdff9f8 EFLAGS: 00010202 [ 336.597560] RAX: ffffffff8431b400 RBX: 0000000020534000 RCX: 0000000000000004 [ 336.604866] RDX: 0000000000000004 RSI: ffff88001bdffc1c RDI: 0000000020534000 [ 336.612177] RBP: ffff88001bdffa60 R08: ffffffff7fffffff R09: ffff88001816fc14 [ 336.619483] R10: 0000000000000000 R11: ffffffff87b6fa40 R12: 0000000000000000 [ 336.626792] R13: ffff88001bdffa00 R14: 0000000000000000 R15: ffff880018786180 [ 336.634134] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 336.639020] ? _copy_to_user+0x90/0x180 [ 336.643074] ? _copy_to_user+0xed/0x180 [ 336.647102] do_ipv6_getsockopt+0x100d/0x3080 [ 336.651678] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 336.657156] ? aa_label_sk_perm+0x725/0x850 [ 336.661576] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.666515] ipv6_getsockopt+0x13c/0x4f0 [ 336.670655] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 336.675581] tcp_getsockopt+0x1c6/0x1f0 [ 336.679612] ? tcp_get_timestamping_opt_stats+0x17f0/0x17f0 [ 336.685407] sock_common_getsockopt+0x13f/0x180 [ 336.690136] ? sock_recv_errqueue+0x950/0x950 [ 336.694726] __sys_getsockopt+0x48c/0x550 [ 336.698979] __se_sys_getsockopt+0xe1/0x100 [ 336.703357] __x64_sys_getsockopt+0x62/0x80 [ 336.707728] do_syscall_64+0xb8/0x100 [ 336.711589] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 336.716825] RIP: 0033:0x457099 [ 336.720068] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.739010] RSP: 002b:00007f66a94bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 336.746771] RAX: ffffffffffffffda RBX: 00007f66a94bb6d4 RCX: 0000000000457099 [ 336.754085] RDX: 0010000000000038 RSI: 0000000000000029 RDI: 0000000000000004 [ 336.761393] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 [ 336.768707] R10: 0000000020534000 R11: 0000000000000246 R12: 0000000000000005 [ 336.776013] R13: 00000000004ccbe0 R14: 00000000004c3ce3 R15: 0000000000000000 13:41:01 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101000, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x0) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000180)='bpq0\x00') readv(r3, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r3, r2, 0x400000000008, 0x0) connect$unix(r4, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0xffffffffffffff5d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r1, r4, 0x6, 0xa) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40600, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000280)={0x800, 0xbc, 0x7, 0x0, 0x0, [{r4, 0x0, 0x1f}, {r6, 0x0, 0xffffffff00000001}, {r5, 0x0, 0x1}, {r2, 0x0, 0x40}, {r5, 0x0, 0x101}, {r3, 0x0, 0x5}, {r1, 0x0, 0x100000000}]}) 13:41:01 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) dup2(r0, r1) 13:41:01 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40040, 0x10) ioctl$KDENABIO(r1, 0x4b36) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) 13:41:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d7660") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:01 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c270000000000010043ae6e463451a9000000660630c202516e63da9b00008792830000000000000eefcea8b7cea284f0f6036d4642c731a9c2fffb00f77691567fac148932520fd6157dd631ae23a5290c63c5be3709059736e37d0000000000000000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000800)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:02 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 337.024868] input: syz1 as /devices/virtual/input/input17 [ 337.096104] input: syz1 as /devices/virtual/input/input18 13:41:02 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000200)={'mangle\x00', 0xf6, "e3c935d3a6e14adfe5bca555c15a6f3ccae0a8ca143d6fc72b1806ec533c03146fb242dec0a4fe048c9a8e81b2fc093f93c2fe1923b92f7cf768f2e423c0ec09fe47d859f8d241501fa3c5664d70d5615b8c5f541de606b1fa444dac47ad201bef1269b489110f67159757f6ecbfbfdbc8dde82a2f6c0af2aa78ae2cc9d6c06559acfba3c633e8019818b2e468301a2259a41b22ed740aeff0f2b66b328925ddce1976a9f353cfccfcdec8ffb35eaa3b3a37fd6ebd3160b00738b53c7563674dc434483fb9a11a80e6bf3ef7a0d1aa3ece5487268997dffbcfbbbcb038b42c3508e4264646073ce9b2a672d14c44894240ba305ebfd5"}, &(0x7f00000000c0)=0x11a) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 337.266399] FAULT_INJECTION: forcing a failure. [ 337.266399] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 337.278321] CPU: 0 PID: 14514 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #41 [ 337.285619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.294988] Call Trace: [ 337.297614] dump_stack+0x14b/0x190 [ 337.301287] should_fail+0xa98/0xaa0 [ 337.305048] __alloc_pages_nodemask+0x5db/0x5c80 [ 337.309877] ? kernel_poison_pages+0x1a0/0x360 13:41:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000800)) gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000900)) r3 = fcntl$getown(r1, 0x9) r4 = getpgid(r3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r6, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000540)=0x3) r9 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r9, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r10, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r9, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r11}}, 0x18) ioctl$SG_EMULATED_HOST(r10, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 337.314505] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 337.319993] ? get_page_from_freelist+0xae35/0xb8b0 [ 337.325076] ? save_stack_trace+0xa3/0xe0 [ 337.329270] ? kmsan_internal_alloc_meta_for_pages+0x1c9/0x700 [ 337.335284] ? wp_page_copy+0x4a7/0x2670 [ 337.339386] ? __do_page_fault+0xc8b/0x17e0 [ 337.343735] ? do_page_fault+0x98/0xd0 [ 337.347649] ? page_fault+0x1e/0x30 [ 337.351343] ? copy_user_generic_unrolled+0x89/0xc0 [ 337.356392] ? task_kmsan_context_state+0x5e/0x110 [ 337.361350] ? task_kmsan_context_state+0x5e/0x110 [ 337.366317] ? __module_address+0x6a/0x600 [ 337.370591] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 337.376349] ? is_bpf_text_address+0x47e/0x4b0 [ 337.381004] ? __kernel_text_address+0x250/0x350 [ 337.385844] kmsan_alloc_page+0x75/0xd0 [ 337.389869] __alloc_pages_nodemask+0xf6b/0x5c80 [ 337.394712] ? __kernel_text_address+0x250/0x350 [ 337.399520] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 337.405016] ? __save_stack_trace+0x89c/0xaa0 [ 337.409595] alloc_pages_vma+0x1578/0x1830 [ 337.413882] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 337.419008] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.423906] handle_mm_fault+0x4377/0x81b0 [ 337.428168] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.433078] __do_page_fault+0xc8b/0x17e0 [ 337.437277] do_page_fault+0x98/0xd0 [ 337.441024] page_fault+0x1e/0x30 [ 337.444500] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 13:41:02 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40040, 0x10) ioctl$KDENABIO(r1, 0x4b36) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f2) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) [ 337.450149] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 337.470722] RSP: 0018:ffff88001806f9f8 EFLAGS: 00010202 [ 337.476110] RAX: ffffffff8431b400 RBX: 0000000020534000 RCX: 0000000000000004 [ 337.483392] RDX: 0000000000000004 RSI: ffff88001806fc1c RDI: 0000000020534000 [ 337.490686] RBP: ffff88001806fa60 R08: ffffffff7fffffff R09: ffff88001bd0fc14 [ 337.497996] R10: 0000000000000000 R11: ffffffff87b6fa40 R12: 0000000000000000 [ 337.505324] R13: ffff88001806fa00 R14: 0000000000000000 R15: ffff880018786180 [ 337.512635] ? compat_ipv6_setsockopt+0x4c0/0x4c0 13:41:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d7660") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 337.517505] ? _copy_to_user+0x90/0x180 [ 337.521521] ? _copy_to_user+0xed/0x180 [ 337.525582] do_ipv6_getsockopt+0x100d/0x3080 [ 337.530112] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 337.535514] ? aa_label_sk_perm+0x725/0x850 [ 337.539921] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.544836] ipv6_getsockopt+0x13c/0x4f0 [ 337.548942] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 337.553829] tcp_getsockopt+0x1c6/0x1f0 [ 337.557866] ? tcp_get_timestamping_opt_stats+0x17f0/0x17f0 [ 337.563697] sock_common_getsockopt+0x13f/0x180 [ 337.568413] ? sock_recv_errqueue+0x950/0x950 [ 337.572941] __sys_getsockopt+0x48c/0x550 [ 337.577132] __se_sys_getsockopt+0xe1/0x100 [ 337.581494] __x64_sys_getsockopt+0x62/0x80 [ 337.585862] do_syscall_64+0xb8/0x100 [ 337.589708] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 337.594916] RIP: 0033:0x457099 [ 337.598177] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.617137] RSP: 002b:00007f66a94bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 337.624884] RAX: ffffffffffffffda RBX: 00007f66a94bb6d4 RCX: 0000000000457099 [ 337.632165] RDX: 0010000000000038 RSI: 0000000000000029 RDI: 0000000000000004 [ 337.639448] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 [ 337.646741] R10: 0000000020534000 R11: 0000000000000246 R12: 0000000000000005 [ 337.654025] R13: 00000000004ccbe0 R14: 00000000004c3ce3 R15: 0000000000000001 [ 337.740593] input: syz1 as /devices/virtual/input/input19 13:41:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r0, &(0x7f0000000040)=0x100000, 0x8002) 13:41:02 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r3, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddacf6b271637a3e0ff91b1ca512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d58470390500000000000000f603ff4642c732b6a9000000f77691567fac148932520fd615f854a0974c267dd6e85ae731ae2309059736e37d000ee381a889699cc0208820b534257b8a2c42247a70618cb00a73b3cf2bbcc9b4edcf5be25cc5ca2f1ecb2accb20eeb864a4c419665e7b9258f5971"]) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000540)=0x3) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xfffffffffffffffa) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000040)=0x6) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00d38a99e9ee7feca0b294bcff3e76"]) lchown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) 13:41:03 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:03 executing program 2: pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) readv(r0, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r0, 0xffffffffffffffff, 0x400000000008, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000200)=""/4096) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001300)={@ipv4={[], [], @loopback}, 0x3e, r2}) 13:41:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180), &(0x7f0000000140)=0x3e7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$packet(0x11, 0xffffffffffffffff, 0x300, &(0x7f0000000100)) readv(r2, &(0x7f0000000080), 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7ff, 0x84400) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000000c0)={0x80000001, 0x7fff, 0xffffffff80000001, 0x0, 0x4, 0x0, 0x415, 0x40, 0x5, 0x9, 0x9}, 0xb) dup2(r1, r2) 13:41:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x3, 0x101000) read$FUSE(r1, &(0x7f00000006c0), 0x1000) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000001c0)={0x2, 0x3, 0x3ff}) execveat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f0000001780)=[&(0x7f00000002c0)='/dev/midi#\x00', &(0x7f0000000300)='/dev/midi#\x00', &(0x7f00000016c0)='ppp1user\x00', &(0x7f0000001700)=',/bdev[:$keyringself\x00', &(0x7f0000001740)='/dev/midi#\x00'], &(0x7f00000018c0)=[&(0x7f00000017c0)="fe2e766d6e6574302600", &(0x7f0000001800)='/dev/midi#\x00', &(0x7f0000001840)='@ppp0keyring\x00', &(0x7f0000001880)='/dev/midi#\x00'], 0x1900) pipe2$9p(&(0x7f0000000040), 0x4000) write$binfmt_elf32(r0, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x31a) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x110) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000200)={0x1, 0x7, 0x9}) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000001900)='big_key\x00', &(0x7f0000001940)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000001980)="1879b887720fb34de0f91945fda11ad136aaff21003f2d732a939b784d64d6e4f812e7241310e4d66002b38f9592d6566739378d892548f59623526002dc6e6de03e9db968c8e331b752b3b69c9a573dc3003e09f287fdba55844c4a08d543fd78da717cee8ed65752bf0b7371900d8ca59ea007c016340211885c3b94830f4435536bc131a3d28355d2b1bc0bb98269c5428315c3c48c184ead92aafeb711aee452eafc300e47986ec40e287617f16e97fc7779d43527de4c1b62f36dccd57fadbe1257dcea9933b3", 0xc9, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f0000001ec0)='keyring\x00', &(0x7f0000001f00)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r2, &(0x7f0000001e40)=[{&(0x7f0000001a80)="bbeae4c8fc3a322d", 0x8}, {&(0x7f0000001ac0)="e5d6096e73d7939f4254b1ab4cc41e03deb4c57566c4fe6fae5e31d61721793964fcc27fa3989f32737d45dd0647aa2160eb52e6077310c82874707f2f9073a241e561941bf5f6b8", 0x48}, {&(0x7f0000001b40)="f6914536276e90b346d99b05ab6a23166c69d52fd24fe926ac52c0cb2b471ad8ecae79de357cffe17c61b94f328a2bb9b87ec1ec100541a287d9aff6c71616617d1c00a8244f36ad7336", 0x4a}, {&(0x7f0000001bc0)="cb9bd329bf87dc30fb61087140386c7743307eb0f972929d440452edf8016940877e81aa927cfecda7a02ac84ef77821ae7648f469ae5e30775eeff6bfc4e36fdeb3959ffd36c470006aec95d2e35905b72ef6836e46751cb8d9f515cf328ee6a55cf18d2d2c39c6a33def3c656e32dbab161544ea469329ac9253bb977819edcf7fcb50c412d76098e5570b9b98622035545e9b630f458f3303cfe83769b72207b92ef36a04cd65d19705ba892cb67f3dcc24c47076a8a92a3983a18b54c27c45beda0e45f7db18d1c9ae6bd3a0b7566524b06c64bdab", 0xd7}, {&(0x7f0000001cc0)="be6624086672b34626cdb5c7f397bcee0e94c942b2697788cdd489b46beb310580d0fb0343913f647b376215138f4863479149961fe967602daa8026c013be84865066d65bbed7460ded1ddab12f57accc351fb0531df72319d8", 0x5a}, {&(0x7f0000001d40)="3cd79a282783a47cc46bb64b8cf1e289cfac66ecc54e1184eee24f44a32ca3d56477c1802097e46bb6404cb105c8a39ae0deea7cc799250540a3b11674f7f36ebcdb66017b55b31cc486a9cd27f2ce987d25dca09b54063d28154596bdbe5c0f4fd96c1a7ee9e7b3c513a221341a10cd58e710ed681ceac2984602fa0d", 0x7d}, {&(0x7f0000001dc0)="45a2a0f20e7574117e7b78ff52424fbf8d7f34a7f7791ef305d1f76a26d364fabacc963f152fd11065b597fac78dddf70f6631d961fec43adaeff9232d1560e854830fd51508da0adbdde707fc64fc56add1939a9cc6f2bc1ff08a5a0c7d983c8220fca9202d4f42890d", 0x6a}], 0x7, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001f80)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001f40)={0xffffffffffffffff}, 0x111}}, 0x20) accept$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x5, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000003c0)='GPL\x00', 0x8001, 0x1000, &(0x7f0000002400)=""/4096, 0x40f00, 0x1, [], r5, 0xf}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000001fc0)={0x4, 0x8, 0xfa00, {r4, 0x8}}, 0x10) timer_create(0xe8ec9c0cfe4b5e96, &(0x7f0000000100)={0x0, 0x1b, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000340)) [ 338.287630] FAULT_INJECTION: forcing a failure. [ 338.287630] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 338.299502] CPU: 0 PID: 14561 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #41 [ 338.306785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.316161] Call Trace: [ 338.318812] dump_stack+0x14b/0x190 [ 338.322480] should_fail+0xa98/0xaa0 [ 338.326245] __alloc_pages_nodemask+0x5db/0x5c80 [ 338.331038] ? kernel_poison_pages+0x1a0/0x360 13:41:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2800000000000041, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x5, "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"}}}, 0x128) dup2(r0, r1) [ 338.335672] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 338.341185] ? get_page_from_freelist+0xae35/0xb8b0 [ 338.346254] ? save_stack_trace+0xa3/0xe0 [ 338.350452] ? kmsan_internal_alloc_meta_for_pages+0x1c9/0x700 [ 338.356466] ? wp_page_copy+0x4a7/0x2670 [ 338.360560] ? __do_page_fault+0xc8b/0x17e0 [ 338.364922] ? copy_user_generic_unrolled+0x89/0xc0 [ 338.369972] ? task_kmsan_context_state+0x5e/0x110 [ 338.374967] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 338.380715] ? is_bpf_text_address+0x47e/0x4b0 [ 338.385349] ? __kernel_text_address+0x250/0x350 [ 338.390184] kmsan_alloc_page+0x75/0xd0 [ 338.394202] __alloc_pages_nodemask+0xf6b/0x5c80 [ 338.399007] ? __kernel_text_address+0x250/0x350 [ 338.403805] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 338.409282] ? __save_stack_trace+0x89c/0xaa0 [ 338.413853] alloc_pages_vma+0x1578/0x1830 [ 338.418142] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 338.423289] ? kmsan_set_origin_inline+0x6b/0x120 [ 338.428188] handle_mm_fault+0x4377/0x81b0 [ 338.432452] ? kmsan_set_origin_inline+0x6b/0x120 [ 338.437362] __do_page_fault+0xc8b/0x17e0 [ 338.441574] do_page_fault+0x98/0xd0 [ 338.445341] page_fault+0x1e/0x30 [ 338.448829] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 338.454511] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 338.473438] RSP: 0018:ffff880016a1f9f8 EFLAGS: 00010202 [ 338.478833] RAX: ffffffff8431b400 RBX: 0000000020534000 RCX: 0000000000000004 13:41:03 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x1000, "7cdcfcce9d97bf29c6bec853624f1ac1f2db34724cadc8539b66f437ad6b6a984ef9a93f1af64c3cbe8a26ef325d2e738336865df845f5dee97c91a27bddfd61d8b134b1159f7c68f8b8489bfae8730f5fbf934a7a71eca06ba955d13efee7d68dbfd8fdc3d8a0ff6dfeb49058da116056b5848049a7730f9ccfbabbb5644c5013a579ca0a394c0e3b8a22c134f8658b9c80b0467265ed4a95037109b6e5de8b26a4f1ccaa811925ba44ccb27d0074dd89617b2f788721ad5c833af2372173c1f00741a3983a037d1f94653661796c08784206270bbe3c89417c75779c2812f8a59d2ee113c56b03d29f5e9c10f6ed7308edef6b79d6b04df04b183d98c3ea5f15324f980a8339a7758fb2ccdd53810abe1334f2ba5c569af2a3a7f283ce5a0c6c6a89603b226d2ead486197fee0536c3166ac8da74b106e9563a648dda7681e6376edf18f816bd3ac03f23a95cfadc95eb7793365744ab7a32fb5b6582b4924169774cfc0ded93a65a0f2948bdf1967bc4dfdcf9d9583dfcdc285db19f0b90d30127234b8fdd4a91880f60101bda13603b9184a174fc38e4ef6ba81800afe90c840b0089c82d66da2e0c5fcb8504a640dfdbc2c02572c2649f59ebbc650a446d92471bcf1d98904ac89979e08c71651836b5ae9a8e2f9ba63beaa97ac8c0762943624cf5946dddf41853eb6b2d1bec8871bc3a18d429de69bb1767dc70e9a9149e2a41d1eea6853df186dfc409188d999cc774c9873331ac9cd2f873be23f2882656cf626040b1012501c16d6ff7c8f486a5a8edf36f7c5b3f060854322c99d963591126894e0cf277dde832c8ac2561f4f39c3091b07e71bc45834ac397929a55a8617ca249d10756b83180673ed3cff4a09c17d893174a059d89ffff6786761668c18c6ead1426af3b1b83847633d44b66f6a7aaedcbe26a92272dffe1e7ae7376a2dea93b8bb479791b569f4195e4f5b8b2b7989224116f7b203fa9f26d823e5fb7f05a2569924fd85f795d8b0fbfc5ea5ba6365e926d467444d03551729f7fc366522f4f035448580df8f1218a3e2447c9734469072e2b28ef59c905de46d78e76e22a767582b6863f37e3ceb23f3c4111da54097c4d71a0ba41eb45379e0db7010879cf153af2e039101a8eab76a898c77b5628d4d8c87c7b83ee9f8212d774b6e544a3ac965128d717c3096d28a85a00be919e1d01b40ba764617e9d7886fe8434742c37c76cd9036882d44383dda4c417421bf90b41d5e07e661805aa688ab45e4eab7debd02f1d67f5362a9ce0df43464d75966a5103c8e5fa066c7b331a7feebe58188c119e4b8418cc87c31616bcfa2344b5bebfc4eeae0b31830f6c42a4b0952c388e2088b3de31407e32521b598158882245caad99ee84fe5e00d6e935db8380f01a6ca68460ba48b1ae20f474db4e5833f2bfe0600e98ea2e0e3924c18190ab43353a8ae4645e6f56ae229a4e9c64ecdb04dc92329442383c548648003f72f44444d6eb9136c3406d7e43bc418f28156541159c6b01d080a7fed8f58e5be9242ced2cb3e7989fdb27f3cf018d9b0f131d57adb90547f17c2dfb42fa3bff5516cc1e9893dfb08cff083a400bc80b77b5d8c49a655cc18c756c69da9d072468031d1e0d033340662f0c9c401168a7bdbb06bcf1e8734f849f0f9df60205cc845a781e48394691922f68617ecf5b11af2cd9d4c194d90f1bbb66ed7b87936f43f45c1c76f14545dceef177a0085a7d43bc763e1baa88b345b7b6849b13a7c83e6caec180e6211e64c8c29977cd80d0b94f635abc93c4845291e73524d3d32e06da1cad6bcb470f502edf23b6ebec6a13c4ccb2a05aca9e56cbf1850dda9a98c1ce8f2aed2c1b801f41e7f23ed1fe468e05518ab91bbbc69845efdd31aa0e60ce3b69ad9913856c235abedc36a268d2c4e05258160c1da0ae6e11ff7245f3a8117495c3ddecf0f906b3ab5a4c64d48ff8d1543dbf42e5bb05b48d15e1410431da8ce0cbb4d375674027fc1502a2186d5d3cdbe59a789721eff841d40106f6ad5b6a5157d5c8f04658e1b7b7f806b0975aa15c2c19ffadb8002f97ff5ff303df4dd6f446bdd50d6be35f3f44823faed58b4d0f9de2576fbb6dd2896a026466a928c1a8465d39027df96054a753ee69e53dc4d6ffd559dc2b14c143f5b3e7bc4f38d1cb84e8f817ed40da650d4be1ddf662bc98cc624a795240d32e3b666bac71965c42fd4b6438fbeec50e4390576be310e41449c8771aa07e7d52cedb64bd71c78e2fbe214d7c661f59e410d1b6755cc8f22e299e09221e565158e8010824098e18258cd30a706c1ff51c3499c0e25894ec89626600813321330831924c9447743d263b294089a90b6332c0d222c03c573fce06682fd555f7f816c50a910df1817a29f8a9721136fd07ec10e58ea205c068b20f00db00f1b276dcfab223f615ae26bff4cff9b02aa71859e7fb180e7b9526ab8ebc1aa689e14fc919d1995406d8a85b0ca115a7c5ea6a7ec97b7b1c24543f7e9a3ed078871d090e4aa969aaee3fa5d32f391beb6e4a8d22b2c50f095b7c02b69d29c2073398b7b7d094df4121eabed90fbdb7904631325ade43c0d8f02e0c8a6e97c4277eb39559a967482f9a5fcfb5952ff9957f694106ca9c5c4576c13ad8dc41f5c1cf08068f18f4a4d48c36e59f99e4d508724d25751fd3ed7247ce4acad5e79da8c738018a1a1f3469a4271417769e7190a085193547039093225cd5c7df56e51711eeeb30747ae0939e67c0ed6729ed8c08b0a6d45d677363d2e1e3c24ff4b722bfa50ef76e56d936b38a562c8febf1c417b56dc1295f86b3eee702647f37a5a4b5ef343e3b290f59e8f875e250522181e6a1dd54dbcbf9f6a133a49df585384787be2c3e7fd07218678eb58744532f26c178c4c0f65159f1058f9bd1fd1ed6d3fb9de27c72b5c8ee473260497472272dea92d7fc4a1033b4cc6efa5cbb672d72fe28baac5d42aa6a01b1c652e797aa4220ef083cbd87c12d5d5f36bf8aeefc24aa30ad36bab2489b7e489cbfb1d469d312a97d13cafac29b4748cfa201e46e2749457b60db7b705f08940138064a1089879c36551a717b278a983b6ddfeda9121f1de7d800bbc1025aa07c83f92cd35b366bd2fc022af03d5c9095ea8b604c0bd25a199ed5659b7ce1eb0770954a652342a4b143913f4931cba003c882907d34f55abd9f6365f3ce382c0d3d8dcfb15ea0191205006df93ba118b68c5a70378779eec8a26f6cc9eb882b5dad3777966f348faa3d240e7287d8d030b4981f6420d94855cf731a477faf3c4f8091e6def17b13e7ca678ac434736dddeef58f18a11f3a6bf1ddd3643a8d64c9f6fdd10ee35d68a78417d85ecece31205081c810315f29ed52e61732af6cf33255f8a6da6a7f3763600bc9bba417710f29e983dbad7bca515da8aa3be4860611cf6fc974b4688ba059a4ac54608d152e7fdfda718f4d2cf5efbc629105774a4dd08dd983288b5014a2646cf137d3957958d5eefea2533cfaebe0b70f7c6442303fdf6078be5907df2962c2d7e33b3cb5dd5832f33c6b442ecb52c598fd58efb77a6704211dba0e8004a2f409161b0de3ec8462e6d34d9b59867fe0f187a362062da6380c303810b32619d2c09ccd7bedada1fe9a4614438718940d3526023efcc0a099e37bd647197f2ef9ce3656a190ceb8478b84e0bf4222f376d4ad3cf9502e4127010f52ec8f37bdc7da157e3202bf7c361896a179a7175499f0c65d73c864b3b0eee1aa13fad3a44008383ef8d52f74cf7ac5f861a3d625c4a802d677ca739c00a1c63053c69b6ddc5f08437052dd269d3c72ed13280d9c5f065612436816177a1c927e4569a3678d8fee64ae09d8bf89fe2d692896df64acf87f8060553b2d4fc2014bd040b5d6b34246c523e442143d87c203c478baa4d311e0774c74cc1778cc8ad891a9494ccded1385944d97680026302b91d680c0640663c69781ed0957be1d4f20876bb1602e5e28495c818de243ee9a41bf989ba54fb287c4ec82e81721ecfac5872847dd3f00d615f78f511dced8d693e68cd512c8065263ef2e8e79a63b9df2b45290ecb285c5f375aaae78ae8aee2b8eee9487a36240dbef3a2702a55d265bb6cb15c711c9968e38508417d1c839ffd36dfdfbbfa7647e89670643b0f5e9e03c1b60ea092b70a456b002a4b1b0f0ac45947ed216ec7d1d6750ae357089db84a74fd5fb2dc49732a3f9de37bb6bcc5ba84fba9a2cfce19703f27f89e47d64cc9892a920511fe08f9a3ebf08ed3ddb9d3df96012a7c85cd6f3540b98e1f04db42e2d56f943aef5a5cc5496990809a7de8155abddd3646dd364db60eb38a19040444aedc1abe9f93fe067cc07fa115a3a1c7812c0ec929058792be206a09ce6697b125b73888aef3da244b5eb538d311990e9edd0ca97e08d905e93723b88d756a89970de38d30446406381655ce3c6f7892433827455e7cc111be2baa8e6aba151a8c1652470de2e798138c148b990bd645ac85afd2408935ed8fa6793b80f436ef257bc220659053d41ae91c891a53c132f8235973614c0d2a7d703b404ad8fd4036c58f7852e7fcce396c6dc2203729c0be9c6b17b485fa757bacd19557fb72f4c8fc2d26be5b6b678b1fa5fdcdf0892be5741232787aaf3363f60cf1d91a238abd5bf2aeb48bfa429e1480bcf1375b1ca7c5d5f55f26dcbd3dea32b765f1171e8e33bcc380267ac24556f1891da272fa8f7e6312c4a4e7b1da79e1945f1aafff33b6517a1b6849a8d6979c8b4615f141ff57d540fd763f9c9cd72662c2eda62ddb7daf4502c3e25086eb9b2571abde7690d8741ff7a962359cb4f829c145e534a9461e09c9f444daf0e269933385b49ed4e0117ac35caa151985abe338f27d5ac37f76bc33a0022aff6b9307a4bf5c044152fc2747a3823cbbb44cd6694598ea41c34bb5d298a7b8110858e92203c7e788b0fbb38510db9f3e64c13f27dca3db1c2fb90580970b02b7f9c85535553151d384f7a36da6f2dcccc72e039cd0b13f3a8607c93cbee6af5eaf121cfc9d746b78decaba7f8b000526f61d1d743bac587b5aa21f69896579a0b8a0ee7c1f7613c831028bddf166a2bae49dc7d5e62b9c8c948f621abe47d2a1684cbe4e32f945005d33d6488b9e8a6164b6a16689f7c6b19391c49b593b88052c58c1e0aa0301ebb8b3f6233910995e3a76b42a76ef8d52aa9613b3f5afdff51c560dcd620c6660b70f480e508603fa5bec38f9cb36d9550d69c06e9e80f674cebd7ef5d1001b38d029f5c50da6eb622223217c0e48f41224df2c6cacaaba5311838845e2d8dc236909aa3294aa65e3bc97c2a4371d53fedaf809966ca8ee2c53ef5b4bfe215061cc02f98eb5859aa8313449496b4557cd96a55c33c17b0dc5e95149565d03aa6393fa681649e8642099ef5cf4f9deaa3107571ca17c593a7293b93e559efb6af5e77257a563ffe026724ef8eaef133f10f557c1e74859f1c160e26bb85f1211119fc608ddcaf1abc9ad5a26d972bdb6a1f30ce76142ce3d9ee221a7d8c2a59f8c8789f0ea7716787337e3bdb2f7c99134a87c341d9efb55ef50c394579d707f0cb5bc5bb89aa78a58d6b1b5277d61401cb1322bb058f95c9a97e6334eea0d36312b4e6636ad3a1cce9b317f6b9cffdb99e8152cb8a75d2dd7fd4895cc5b85d8cd8644d7d5cee2476f4b3a44cd2b1681224172d29e776e9b484d4fca4858d6f2340f55bb654182c274d737274dc858e4d0d788369a91e085063c38d908a67086a9"}, &(0x7f0000000040)=0x1008) r4 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e20, @multicast1}}, [0x5, 0x4356, 0x9, 0xffffffff, 0x4, 0x1, 0x7, 0x0, 0x3, 0x40, 0x800, 0x4, 0x0, 0x10000, 0xfffffffffffffff7]}, &(0x7f0000001240)=0x100) [ 338.486126] RDX: 0000000000000004 RSI: ffff880016a1fc1c RDI: 0000000020534000 [ 338.493416] RBP: ffff880016a1fa60 R08: ffffffff7fffffff R09: ffff880016a8fc14 [ 338.500701] R10: 0000000000000000 R11: ffffffff87b6fa40 R12: 0000000000000000 [ 338.507990] R13: ffff880016a1fa00 R14: 0000000000000000 R15: ffff880017210900 [ 338.515294] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 338.520164] ? _copy_to_user+0x90/0x180 [ 338.524174] ? _copy_to_user+0xed/0x180 [ 338.528193] do_ipv6_getsockopt+0x100d/0x3080 [ 338.532720] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 338.538113] ? aa_label_sk_perm+0x725/0x850 [ 338.542483] ? kmsan_set_origin_inline+0x6b/0x120 [ 338.547371] ipv6_getsockopt+0x13c/0x4f0 [ 338.551480] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 338.556397] tcp_getsockopt+0x1c6/0x1f0 [ 338.560414] ? tcp_get_timestamping_opt_stats+0x17f0/0x17f0 [ 338.566150] sock_common_getsockopt+0x13f/0x180 [ 338.570854] ? sock_recv_errqueue+0x950/0x950 [ 338.575380] __sys_getsockopt+0x48c/0x550 [ 338.579569] __se_sys_getsockopt+0xe1/0x100 [ 338.583951] __x64_sys_getsockopt+0x62/0x80 [ 338.588305] do_syscall_64+0xb8/0x100 [ 338.592191] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 338.597412] RIP: 0033:0x457099 [ 338.600625] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.619544] RSP: 002b:00007f66a94bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 338.627281] RAX: ffffffffffffffda RBX: 00007f66a94bb6d4 RCX: 0000000000457099 13:41:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 338.634577] RDX: 0010000000000038 RSI: 0000000000000029 RDI: 0000000000000004 [ 338.641880] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 [ 338.649162] R10: 0000000020534000 R11: 0000000000000246 R12: 0000000000000005 [ 338.656444] R13: 00000000004ccbe0 R14: 00000000004c3ce3 R15: 0000000000000002 13:41:03 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$int_out(r0, 0x80084121, &(0x7f0000000040)) 13:41:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4007}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2}, 0x78) r1 = socket$inet_smc(0x2b, 0x1, 0x0) accept(r1, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000040)=0x80) 13:41:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) fcntl$setpipe(r0, 0x407, 0x40) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) clone(0x10a800, &(0x7f00000002c0)="cef92cb7a50eed3316700a70aea4bfe2a0eb74190aad881ba8f8ca74840d320c996dd66562b7b0b731539e48c06e4445adbb22081b59068b48fb9fffb9a38bc2625705e7db484d6ea52c543b009e36fb8e4e2d458e2befb69c27675ade973fd3533dd4c1a754efc7329925b68e4cae44e48e40f947f16d05fe127da48be4964ed24a5b3ea985780f4c3a819b451d491a1b5394af0d2d92486bae17dbf252d6cc7a7db5416e12e961a3b2922a229a1011c239fc365263822eb9234a4be56e1973fb8a7acd7d4fe1aa23fc19788624e2cb99", &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000003c0)="13179457b8d3b5df556508fb690f8b6f951764f1af12d387052d61826d0db4eee72a1f39270551ecbca55b33b00fe423781a0c9aacc404fb409e2d7de0ebb451864875f5553a47246dc2482daa9874b39f7edcbf55d0a4d480ffe063a8a404998d01b6422fb31c20ce7cbbc997cdeeb04d895858b46502a705ceaecd4b0f0d6bc4dd9a2b5d3161bd39e2cdf54265d5b5652ba5aaaaf9373714e72310d2657e90ecc4409db8f8a7cebd4150a713dc4176") r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20000, 0x0) socketpair$inet6(0xa, 0xa, 0x101, &(0x7f0000000100)) getdents64(r2, &(0x7f0000000100), 0x0) 13:41:03 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c272b02516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000380)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:03 executing program 7: r0 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)="50877ab64fe25ac150384dbc46b1bec9c3f0eabf71364049275d112a6f9dea944cde3965c840bc674db2730bbce9d7826399f7cd85add863c65908a6da92763931898123257a69f7358549957e322c009dd0c35ae637f79132552df94ee491b4f9cc4d43407c42a82a5db5e7519a82ab89f62a99aa705147459a059d67cb6bad765a7b61ac23e5b6043c274a7d0edf4153365149d56c47ec8e8f1edf3c", 0x9d, 0xfffffffffffffffa) r1 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000004c0)="3e1302df92807f4daf279be94a38be50a1f70f3dec884e08cb9cba88eef95534deef10086c864b567931172a7e0c104ff0681b8619f81ba17f7501171cf8d0f88d954a9cdaa4f5a10bac36f64dcb6f71a6d76455a937e8bd858c803de2f8110f61e63d4652b4db61d6eaa9782de41009f300d1931081fcd7611e2f0d2ae10a107c3bf58d3fbf5192740f05ae147b8185081aaf286b5c3ad91c821500de68d434a2b564574f04067095030692c2b1c1c9f8297d79ca2585f5a16d5340f0bf2a106c296808ef61cbf87bf1e09d828a6830b3e9edad2049f9f2d0476c", 0xdb, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000005c0)={r0, 0x0, r1}, &(0x7f0000000600)=""/111, 0x6f, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r2, &(0x7f00000000c0)=""/220, 0xdc, 0x2000, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e24}, 0x6e) readv(r2, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x3f) r4 = dup2(r3, r3) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000680)={0x2, 0x100000001, 0x1, 0x1}, 0x10) 13:41:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:04 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:04 executing program 5: r0 = semget$private(0x0, 0x0, 0x0) unshare(0x40000) semtimedop(0x0, &(0x7f0000000140), 0x0, &(0x7f0000efe000)={0x2000}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001040)='/dev/dsp\x00', 0x8001, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000001080)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}}}, &(0x7f0000001140)=0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000001180)=@assoc_id=r2, &(0x7f00000011c0)=0x4) semop(r0, &(0x7f0000001380)=[{0x1000000003, 0x100000001}, {0x0, 0xfffffffffffffffd}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) unshare(0x8000000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040), 0x1000) [ 339.183820] FAULT_INJECTION: forcing a failure. [ 339.183820] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 339.195895] CPU: 1 PID: 14611 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #41 [ 339.203203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.212593] Call Trace: [ 339.215316] dump_stack+0x14b/0x190 [ 339.218989] should_fail+0xa98/0xaa0 [ 339.222761] __alloc_pages_nodemask+0x5db/0x5c80 [ 339.227585] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 339.233006] ? try_charge+0x2432/0x2f80 [ 339.237034] ? __kernel_text_address+0x250/0x350 [ 339.241887] ? kmsan_set_origin_inline+0x6b/0x120 [ 339.246821] alloc_pages_current+0x6b1/0x970 [ 339.251353] pte_alloc_one+0x5a/0x1a0 [ 339.255209] do_huge_pmd_anonymous_page+0xee8/0x27e0 [ 339.260408] handle_mm_fault+0x4377/0x81b0 [ 339.264696] ? kmsan_set_origin_inline+0x6b/0x120 [ 339.269628] __do_page_fault+0xc8b/0x17e0 [ 339.273884] do_page_fault+0x98/0xd0 [ 339.277680] page_fault+0x1e/0x30 [ 339.281190] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 339.286864] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 339.305813] RSP: 0018:ffff88001c27f9f8 EFLAGS: 00010202 [ 339.311230] RAX: ffffffff8431b400 RBX: 0000000020534000 RCX: 0000000000000004 [ 339.318547] RDX: 0000000000000004 RSI: ffff88001c27fc1c RDI: 0000000020534000 [ 339.325884] RBP: ffff88001c27fa60 R08: ffffffff7fffffff R09: ffff88001ad6fc14 [ 339.333190] R10: 0000000000000000 R11: ffffffff87b6fa40 R12: 0000000000000000 [ 339.340508] R13: ffff88001c27fa00 R14: 0000000000000000 R15: ffff880018786180 [ 339.347848] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 339.352734] ? _copy_to_user+0x90/0x180 [ 339.356798] ? _copy_to_user+0xed/0x180 [ 339.360830] do_ipv6_getsockopt+0x100d/0x3080 [ 339.365408] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 339.370843] ? aa_label_sk_perm+0x725/0x850 [ 339.375249] ? kmsan_set_origin_inline+0x6b/0x120 [ 339.380209] ipv6_getsockopt+0x13c/0x4f0 [ 339.384365] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 339.389285] tcp_getsockopt+0x1c6/0x1f0 [ 339.393343] ? tcp_get_timestamping_opt_stats+0x17f0/0x17f0 [ 339.399106] sock_common_getsockopt+0x13f/0x180 [ 339.403837] ? sock_recv_errqueue+0x950/0x950 [ 339.408397] __sys_getsockopt+0x48c/0x550 [ 339.412625] __se_sys_getsockopt+0xe1/0x100 [ 339.416996] __x64_sys_getsockopt+0x62/0x80 [ 339.421347] do_syscall_64+0xb8/0x100 [ 339.425164] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 339.430376] RIP: 0033:0x457099 [ 339.433594] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.452509] RSP: 002b:00007f66a94bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 339.460253] RAX: ffffffffffffffda RBX: 00007f66a94bb6d4 RCX: 0000000000457099 [ 339.467576] RDX: 0010000000000038 RSI: 0000000000000029 RDI: 0000000000000004 [ 339.474879] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 13:41:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4007}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2}, 0x78) r1 = socket$inet_smc(0x2b, 0x1, 0x0) accept(r1, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000040)=0x80) 13:41:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) poll(&(0x7f00000000c0), 0x0, 0x2) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xca, 0x90000) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'bridge_slave_0\x00'}}) [ 339.482159] R10: 0000000020534000 R11: 0000000000000246 R12: 0000000000000005 [ 339.489444] R13: 00000000004ccbe0 R14: 00000000004c3ce3 R15: 0000000000000003 13:41:04 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) clock_gettime(0x5, &(0x7f0000000080)) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x0, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:04 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x880, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c00000001040101ff0003fffdffff2e0a0800000c000400010000007f70c5010c000300fbfffe02f1000000"], 0x2c}}, 0x0) 13:41:04 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000800)='/dev/full\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 339.903562] FAULT_INJECTION: forcing a failure. [ 339.903562] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 339.915436] CPU: 0 PID: 14654 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #41 [ 339.922733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.932103] Call Trace: [ 339.934719] dump_stack+0x14b/0x190 [ 339.938382] should_fail+0xa98/0xaa0 [ 339.942139] __alloc_pages_nodemask+0x5db/0x5c80 [ 339.946933] ? kernel_poison_pages+0x1a0/0x360 [ 339.951549] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 339.957027] ? get_page_from_freelist+0xae35/0xb8b0 [ 339.962076] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 339.967480] ? update_load_avg+0x6c4/0x1a00 [ 339.971833] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 339.977314] ? rb_erase_cached+0xbe3/0x2c60 [ 339.981670] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 339.987086] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 339.992839] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 339.998265] ? __perf_event_task_sched_in+0x9d8/0xa30 13:41:05 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x268000, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000140)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@empty, 0x2b, r1}) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[]}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = socket(0x10, 0x800000000000003, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) [ 340.003501] ? kmsan_set_origin_inline+0x6b/0x120 [ 340.008392] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 340.013781] ? memcg_kmem_charge+0x7a4/0xd10 [ 340.018231] kmsan_alloc_page+0x75/0xd0 [ 340.022355] __alloc_pages_nodemask+0xf6b/0x5c80 [ 340.027162] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 340.032568] ? try_charge+0x2432/0x2f80 [ 340.036573] ? __kernel_text_address+0x250/0x350 [ 340.041385] ? kmsan_set_origin_inline+0x6b/0x120 [ 340.046290] alloc_pages_current+0x6b1/0x970 [ 340.050745] pte_alloc_one+0x5a/0x1a0 [ 340.054575] do_huge_pmd_anonymous_page+0xee8/0x27e0 [ 340.059737] handle_mm_fault+0x4377/0x81b0 [ 340.064003] ? kmsan_set_origin_inline+0x6b/0x120 [ 340.068912] __do_page_fault+0xc8b/0x17e0 [ 340.073119] do_page_fault+0x98/0xd0 [ 340.076892] page_fault+0x1e/0x30 [ 340.080377] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 340.086035] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 340.104949] RSP: 0018:ffff88001bdef9f8 EFLAGS: 00010202 [ 340.110333] RAX: ffffffff8431b400 RBX: 0000000020534000 RCX: 0000000000000004 [ 340.117624] RDX: 0000000000000004 RSI: ffff88001bdefc1c RDI: 0000000020534000 [ 340.124917] RBP: ffff88001bdefa60 R08: ffffffff7fffffff R09: ffff88001a81fc14 [ 340.132209] R10: 0000000000000000 R11: ffffffff87b6fa40 R12: 0000000000000000 [ 340.139533] R13: ffff88001bdefa00 R14: 0000000000000000 R15: ffff880018782680 [ 340.146850] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 340.151732] ? _copy_to_user+0x90/0x180 [ 340.155737] ? _copy_to_user+0xed/0x180 [ 340.159750] do_ipv6_getsockopt+0x100d/0x3080 [ 340.164340] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 340.169730] ? aa_label_sk_perm+0x725/0x850 [ 340.174097] ? kmsan_set_origin_inline+0x6b/0x120 [ 340.179016] ipv6_getsockopt+0x13c/0x4f0 [ 340.183138] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 340.188006] tcp_getsockopt+0x1c6/0x1f0 [ 340.192064] ? tcp_get_timestamping_opt_stats+0x17f0/0x17f0 [ 340.197815] sock_common_getsockopt+0x13f/0x180 13:41:05 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r2 = dup2(r0, r1) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x8) [ 340.202547] ? sock_recv_errqueue+0x950/0x950 [ 340.207089] __sys_getsockopt+0x48c/0x550 [ 340.211289] __se_sys_getsockopt+0xe1/0x100 [ 340.215654] __x64_sys_getsockopt+0x62/0x80 [ 340.220011] do_syscall_64+0xb8/0x100 [ 340.223846] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 340.229064] RIP: 0033:0x457099 [ 340.232291] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.232339] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 340.251218] RSP: 002b:00007f66a94bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 340.251257] RAX: ffffffffffffffda RBX: 00007f66a94bb6d4 RCX: 0000000000457099 [ 340.251271] RDX: 0010000000000038 RSI: 0000000000000029 RDI: 0000000000000004 [ 340.251284] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 [ 340.251297] R10: 0000000020534000 R11: 0000000000000246 R12: 0000000000000005 [ 340.251311] R13: 00000000004ccbe0 R14: 00000000004c3ce3 R15: 0000000000000004 13:41:05 executing program 4: r0 = socket$inet(0x2, 0x3, 0x8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) io_setup(0x7, &(0x7f0000000100)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bond_slave_0\x00', 0x10) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000600), 0x0, &(0x7f0000002040)}}], 0x2, 0x0) 13:41:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x0, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:05 executing program 0: socket$nl_xfrm(0xa, 0x3, 0x87) r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x2fb, 0x100) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000001c0)=0x1, &(0x7f0000000200)=0x2) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)={0x0, 0x0, [0x0, 0xe47]}) 13:41:05 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a381d991b185512c2700000000000100000000660630c202516e63da9b9d568792835c8f8054d584000006000000cea8b2cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00502f107694bbd5fdf40608a4bcd69e0e2ca2b873a5ef8ec6e2f06f4f6037760034cd9f4bb51fc0f1d2e6d6968683b1a73e8e000000000000"]) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f0000000400)={&(0x7f0000000880)=ANY=[@ANYBLOB="280700001900010000000000000000000a0000000000000000000000040008000800060000000000f348f3f68aeae2169bd982d45bbaa0c75f9fe2e5022ae9a3b8c5a81d7faf471dbde7db07e4732e5b9933c3392b0f007db7dd8f2d653965efd37411c7bb"], 0x28}}, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ptmx\x00', 0x20400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000540)=0x3) r8 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r8, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r8, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) ioctl$SG_EMULATED_HOST(r9, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) 13:41:05 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r2 = dup2(r0, r1) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x4, 0x4a0, 0x140, 0x278, 0x278, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000040), {[{{@arp={@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff, 0x0, @empty, {[0x0, 0xff, 0xff, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}, 0x1, 0x400, 0xd3, 0x3e93, 0x0, 0x3, 'team0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x0, 0x80}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="e6617e274739", @empty, @multicast2, @loopback, 0x2, 0xffffffff}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x1d}, @broadcast, 0xff, 0xffffff00, @mac=@remote, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@local, {[0x0, 0x0, 0xff, 0x0, 0xff]}, 0x1, 0x400, 0x3ff, 0x5, 0x8, 0x7, 'bond_slave_0\x00', 'veth1_to_bond\x00', {}, {}, 0x0, 0x80}, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xc8, 'syz1\x00', 0x1}}}, {{@arp={@loopback, @remote, 0xff0000ff, 0xffffffff, @empty, {[0x0, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x3f, 0x0, 0x5, 0x5, 0x100, 0x14, 'bond0\x00', 'syzkaller0\x00', {0xff}, {0xff}, 0x0, 0xa4}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="656bff83fd75", @empty, @dev={0xac, 0x14, 0x14, 0xa}, @broadcast, 0x2, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) [ 340.610609] netlink: 'syz-executor5': attribute type 4 has an invalid length. [ 340.618095] netlink: 'syz-executor5': attribute type 3 has an invalid length. [ 340.656102] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 13:41:05 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000800)='/dev/full\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000005cc0)=[{{&(0x7f0000000000)=@rc, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004a80)=""/164, 0xa4}], 0x1, &(0x7f0000004cc0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000000080)={0x77359400}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0x2a3) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f0000000340), 0x10) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000140)="b0d20f8106a13e4a8be3a6dd8295b8b10db07470dbfe57ca709121e42eff94b3ed2262b9f98d3e93b2a31434b71c00e817709c2aef4c9d78d3c7db85f11efb9eda4ea59c0cd6219fdacd420f4d135ed10e23701f2e076943ad54fa76351d2e481e18dfe57867ec146afd73b02f364702731369916c45d028f58045ffdfb8bf750277d1b34e55ec52774e2ea374de8c52fb9d75807937e325e8d3fa84cd0bddaeb78f2ddb28340e8c7028c0be5eb83df866ed5c6bfafd48b0024774e2e2bd2fbdf1484628acf20df520ae05fe4fc8f1599f1dc23b6748", 0xd6) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x18020000, &(0x7f0000004b40), 0x15, &(0x7f0000004bc0)}}], 0x31e9cd3487dc94, 0xe0) 13:41:05 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f00000000c0)) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000680)=ANY=[@ANYBLOB="cfc7af3a0000000000000000010000000a00000000000000", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="00000000810000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB="00000000010000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000010400000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000010000000000000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000076c700000000000000000000000000000000000000000000"]) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={r4, r5+10000000}, &(0x7f0000000080)) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x224000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x18, r3, 0xe10, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 13:41:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/55, 0xffffffffffffffa2}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0xe000000000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7}) read(r1, &(0x7f0000000240)=""/19, 0x129) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) readv(r5, &(0x7f00000025c0)=[{&(0x7f0000000280)=""/213, 0xd5}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xd9}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x3) tee(r4, r3, 0x400000000008, 0x0) r6 = accept(r2, &(0x7f0000000100)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000004c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e0, 0x460, 0x0, 0x118, 0x118, 0x228, 0x548, 0x548, 0x548, 0x548, 0x548, 0x6, &(0x7f0000000380), {[{{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xb}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x3f, 0x0, @remote, 0x4e23}}}, {{@ip={@multicast1, @multicast2, 0x0, 0x0, 'ipddp0\x00', 'veth0_to_bond\x00', {}, {0xff}, 0x7f, 0x2, 0x40}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0x100000000, 0x3ff}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x21, 0x4, 0x1}}}, {{@ip={@empty, @rand_addr=0x3ff, 0xff, 0xff000000, 'bond_slave_1\x00', 'dummy0\x00', {}, {0xff}, 0xde, 0x2, 0x1}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x50, 0x0, 0x1, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x3}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x9dd, 0xa54}, {0x5, 0x5, 0xac6}, {0x7, 0x1}, 0x5, 0xfc0000000000000}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0xffffffffffffffc1}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x640) tee(r2, r5, 0x6, 0xa) connect$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:06 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x10000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1, @broadcast}, &(0x7f0000000140)=0xc) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000180)={@loopback, r3}, 0x14) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000040)=0x800, 0x2, 0x4) dup2(r0, r1) 13:41:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x0, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:06 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x4, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other='allow_other'}]}}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x19, &(0x7f00000000c0)={0x0}, &(0x7f0000000000)=0xfffffffffffffe60) syz_open_procfs(r5, &(0x7f0000000040)='net/rt_cache\x00') ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000500)=""/162) 13:41:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="6934e59a3eb66640cd5459ebff3b40dd9c6ac8dfd7c0cb096533614d6c76528ec54ed556270ee34de8", 0x29, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000900)=']-\x00\x00\x00\x00\x00\x00\x00\x00@', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:06 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8240, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x7, 0xe, 0x10, "cc522bbc60d8d2cb230aaa10ea3052c351f81c06a253d23e054672f40470d4e6e57cc197e0e2a912d778f19f39e16508e09094160b4fee287d0fed07d338f153", "37f3d4f203c62290c3e08bbfc2708177016346785f6255477e871a58a3167001", [0x9, 0x4]}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r2, 0x60}], 0x1, &(0x7f0000000240)={r3, r4+30000000}, &(0x7f0000000280)={0x90}, 0x8) dup2(r1, r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) 13:41:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x8020000) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) semget$private(0x0, 0x4007, 0x0) unshare(0x8020400) r1 = dup(r0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) [ 341.630206] FAULT_INJECTION: forcing a failure. [ 341.630206] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.642083] CPU: 0 PID: 14756 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #41 [ 341.649370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.658743] Call Trace: [ 341.661367] dump_stack+0x14b/0x190 [ 341.665032] should_fail+0xa98/0xaa0 [ 341.668804] __alloc_pages_nodemask+0x5db/0x5c80 [ 341.673598] ? kernel_poison_pages+0x1a0/0x360 [ 341.678207] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 341.683676] ? get_page_from_freelist+0xae35/0xb8b0 [ 341.688735] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.694132] ? update_load_avg+0x6c4/0x1a00 [ 341.698745] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 341.704226] ? rb_erase_cached+0xc32/0x2c60 [ 341.708636] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 341.714397] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.719834] ? __perf_event_task_sched_in+0x9d8/0xa30 [ 341.725088] ? kmsan_set_origin_inline+0x6b/0x120 13:41:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={"66696c7465720400"}, &(0x7f0000000000)=0x44) close(r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0x30, 0x1}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000100)=0xc) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000200)=0x10, 0x4) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") [ 341.730000] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.735405] ? memcg_kmem_charge+0x7a4/0xd10 [ 341.739845] kmsan_alloc_page+0x75/0xd0 [ 341.743857] __alloc_pages_nodemask+0xf6b/0x5c80 [ 341.748661] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.754110] ? try_charge+0x2432/0x2f80 [ 341.758110] ? rb_erase_cached+0x2013/0x2c60 [ 341.762574] ? kmsan_set_origin_inline+0x6b/0x120 [ 341.767502] alloc_pages_current+0x6b1/0x970 [ 341.771957] pte_alloc_one+0x5a/0x1a0 [ 341.775807] do_huge_pmd_anonymous_page+0xee8/0x27e0 [ 341.780987] handle_mm_fault+0x4377/0x81b0 [ 341.785249] ? kmsan_set_origin_inline+0x6b/0x120 [ 341.790151] __do_page_fault+0xc8b/0x17e0 [ 341.794367] do_page_fault+0x98/0xd0 [ 341.798111] page_fault+0x1e/0x30 [ 341.801589] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 341.807245] Code: 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 06 <88> 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f 40 00 [ 341.826162] RSP: 0018:ffff88001540f9f8 EFLAGS: 00010202 [ 341.831553] RAX: ffffffff8431b400 RBX: 0000000020534000 RCX: 0000000000000004 [ 341.838858] RDX: 0000000000000004 RSI: ffff88001540fc1c RDI: 0000000020534000 [ 341.846140] RBP: ffff88001540fa60 R08: ffffffff7fffffff R09: ffff88001541fc14 [ 341.853429] R10: 0000000000000000 R11: ffffffff87b6fa40 R12: 0000000000000000 [ 341.861728] R13: ffff88001540fa00 R14: 0000000000000000 R15: ffff880018782680 [ 341.869030] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 341.873896] ? _copy_to_user+0x90/0x180 [ 341.877905] ? _copy_to_user+0xed/0x180 [ 341.881915] do_ipv6_getsockopt+0x100d/0x3080 [ 341.886443] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.891850] ? aa_label_sk_perm+0x725/0x850 [ 341.896414] ? kmsan_set_origin_inline+0x6b/0x120 [ 341.901319] ipv6_getsockopt+0x13c/0x4f0 [ 341.905418] ? compat_ipv6_setsockopt+0x4c0/0x4c0 [ 341.910297] tcp_getsockopt+0x1c6/0x1f0 [ 341.914315] ? tcp_get_timestamping_opt_stats+0x17f0/0x17f0 [ 341.920053] sock_common_getsockopt+0x13f/0x180 [ 341.924754] ? sock_recv_errqueue+0x950/0x950 [ 341.929296] __sys_getsockopt+0x48c/0x550 [ 341.933487] __se_sys_getsockopt+0xe1/0x100 [ 341.937872] __x64_sys_getsockopt+0x62/0x80 [ 341.942225] do_syscall_64+0xb8/0x100 [ 341.946063] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 341.951271] RIP: 0033:0x457099 [ 341.954485] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.973424] RSP: 002b:00007f66a94bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 341.981164] RAX: ffffffffffffffda RBX: 00007f66a94bb6d4 RCX: 0000000000457099 [ 341.988462] RDX: 0010000000000038 RSI: 0000000000000029 RDI: 0000000000000004 [ 341.995745] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 [ 342.003034] R10: 0000000020534000 R11: 0000000000000246 R12: 0000000000000005 [ 342.010316] R13: 00000000004ccbe0 R14: 00000000004c3ce3 R15: 0000000000000005 13:41:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000006ffc)=0x6, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x100, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x0, r0}) sendto$inet6(r0, &(0x7f0000000140)="3f010000f70800000000000094bc", 0xe, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x4, @mcast1}, 0x1c) recvfrom(r1, &(0x7f0000000080)=""/191, 0xbf, 0x40002100, &(0x7f0000000180)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x40004000}, 0x80) 13:41:07 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x828c150dc7a24782, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x100000001) ftruncate(r0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000200)={0x16, 0xd2, &(0x7f0000000100)="264a670ae549e4eee6532319da951bf5b11c602eea8d3ca551a7c73942a44314d0a3e0e43043e4e70878db8300b2dcadcd7941c30387682410fc9e7acfaa30ff60489202993568cf3495419fdf84d15accc8ce94134b9ed7c2cc540d4a7c9d102dd503150c8fce1f6d9194782a44b7f8a6476fb7b04bcb49f8a55f035ef8a2ee55482682f6f150dd173c9cffd5e356c2f8a0feb0619071f01a4be454e9197b3a6895fdde03db0df77e94b89beb276666c4b762e0b9dd0c9a8e9aa992b716745a84e55285e2d40783136ffc15c0906f57ec1a"}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) 13:41:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={"66696c7465720400"}, &(0x7f0000000000)=0x44) close(r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0x30, 0x1}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000100)=0xc) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000200)=0x10, 0x4) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") 13:41:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:07 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d569792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00335848371297"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000692ff0)='/dev/sequencer2\x00', 0x8002, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080), &(0x7f0000000100)) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f00000000c0), 0x1000000000000136) 13:41:07 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x10000) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) syncfs(r1) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0x100000002, 0x9, 0x8}, 0x800}, 0xfffa) 13:41:07 executing program 7: openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0xc000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000040)) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r2 = dup2(r1, r1) connect$bt_rfcomm(r2, &(0x7f00000000c0)={0x1f, {0x100, 0x1, 0x1, 0x100000001, 0x10000, 0x2}, 0x1}, 0xa) dup2(r0, r1) 13:41:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8240, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x7, 0xe, 0x10, "cc522bbc60d8d2cb230aaa10ea3052c351f81c06a253d23e054672f40470d4e6e57cc197e0e2a912d778f19f39e16508e09094160b4fee287d0fed07d338f153", "37f3d4f203c62290c3e08bbfc2708177016346785f6255477e871a58a3167001", [0x9, 0x4]}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r2, 0x60}], 0x1, &(0x7f0000000240)={r3, r4+30000000}, &(0x7f0000000280)={0x90}, 0x8) dup2(r1, r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) 13:41:07 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x101, 0x800) socket$inet_icmp_raw(0x2, 0x3, 0x1) fsync(r0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x3, 0xce, [], 0x8, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/206}, &(0x7f00000002c0)=0x78) r2 = socket$inet6(0xa, 0x1, 0x0) sendmmsg$alg(r1, &(0x7f0000001dc0)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="8b70179a0238af3eb9c24230f2628fcafa3663ea8c5851889d96afb7c838b672beb95c97b2abd0", 0x27}, {&(0x7f0000000340)="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", 0xfc}, {&(0x7f0000000440)="18a4d08f85f64f", 0x7}, {&(0x7f0000000480)="acc921044b3e01bec43e2996e097d7aeba8e1b4af3", 0x15}], 0x4, &(0x7f0000000500)=[@iv={0xc8, 0x117, 0x2, 0xb4, "c39bba32c88ea6018dd2abf07a5c6829d8de231a4a82f63a046b867c229b0cd5327c76710efb025b1312d221eacf6fe66498ce2929d42da8a59e991779c76052332b915ed15f1d8fa47c2bfd5eb27b7ae2bf7e909dab6a0817d2a9e87425979125260128436c4cb68e2b2009187da0870387c5b3ab05ad9cb31bbae1b94ce1adb8b421b645fee7c55cc3f498f8dba6e0d5ca644196cccb8be4062a24e9aad5bcec5ce615cd420824834950cd76c85f1db5ba67aa"}, @op={0x18, 0x117, 0x3, 0x1}], 0xe0, 0x4001}, {0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000600)="c3f8ebee08ff0aa58335d1264832a581990375f9fc926c480228e50bbd0d996b51e494801eba93d692d71f18a74221df6032d284d0f4ea4675ef10a241a17d31ea52092369b7c84ef445371fdb4f0cd2cccbc755404694ed206dbef7f4d3158604d6db48c3a1023634ea", 0x6a}, {&(0x7f0000000680)="f035d308c1a6d3e2040f0c6d4988e0b5a0b529eaa57eaa4f355b9a600497ac64e64b6c4b188f0c16c5f430fc2ba4855139b0b8091aed2958131c33679fb09ac564e917eae751bd", 0x47}, {&(0x7f0000000700)="8ff3da21b286bb1b9b18dc299a52079213edda5c4ebf470e433a1bf83d44a2e22f980edc4511dfa2e3a2f136", 0x2c}, {&(0x7f0000000740)="e5e4ece6d0e55adad5dfb033328a73fab8418674a88395c415cda35a5530cc7cc35e4db5ea", 0x25}, {&(0x7f0000000780)="6a8cf7849a8c99315baabbb21f62dda5807002aa53f31f27fb5df3bb01d7598e143acbfc20d2592c4c4a3d77d2a0ede9435793fec2a93dabd28e4d5b0e50918c422971988c104500860b2b03c59dda3da4496b25edf9e8c271ae12500187e7a499d58c15e4efd1cabaa606c36fc91365124b7fd1e3aa1f2105ced0ab731ec04c7763e478c1c89eaaf8a27fd3b85a481f1813faf1191ddec2b56f8d65547c647453fb3b0054f194de8f3ece7375e3173bd5f813ed4264d0a91e175f63c1854a55e544704684cf39ec", 0xc8}, {&(0x7f0000000880)="4e2c907a50a5dfa258aa9cb96fa040e21488bf058f703f8f0dfa4e555f0e5a0a8378f50b5b02184bfdeac1b59404d1be26fbab0b5b77c0d350f7084b875e7daa2e62a2a7787eb08ade49f6508dc953866293f52c42e7163ccd3537fa494be408c977ee343fa3e17dd320a31caafac3129d95885a5594f5075c2d5fec062aa4c1b9fe45c15bf706225d87940f4fa60940fc290ecf7fbe3d4ce11eea8c550a73d6f75bbf94810feab9219503a964a14d7d25db170c3444737e5256b39f09677abde14eb4c03d7d62b6ee9b2a7f66f9ede7b6f294aa54f1e4dec247", 0xda}, {&(0x7f0000000980)="afd6dc4b5d484f79fa57d1164817939614c428a237bcd44d0fddbabac02568dfb58c60e7437725ff7fcfeaeef1d40494877f1172fa9176c5bcf0f83265c161ada09d6c8699d9f8b54879597c365361719375fabb1e3d59f573edff9cbac1bee224f8abdfd8826727f6909cfceb4910de9a4b57", 0x73}, {&(0x7f0000000a00)="e9b6bbb9cb831b8e9932bd626163a7a4d4cf2689087350eb5ce02e38cbd8afd1c809", 0x22}], 0x8, &(0x7f0000000ac0)=[@assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x50, 0x117, 0x2, 0x37, "bb202a4c6f2237505c8dfadcaf657759abad550d2be8ef8bbce920c56afa62bc605f07b34fefc0e89fd43d1188b3fd2ed7cfb54ea8bbdb"}, @iv={0x108, 0x117, 0x2, 0xf4, "ef30f5afdec450c5c9014f8bd77140fb945e7298b5d6cb32df410367effa42fee12b067224f0ad53cdd14f9d5d09ccbb301bd522c227ded344ede94f876db6051ae24d3d1b87986c4a21e6988eaf9d64e0466eae8637d40604c39d636348abb78f7ffd370653c9cd43b08ed9b7e2124f4384171d2d02c103fe4d4cb1837aad6dcb32f1b061e96f9e35792fee86da42018a6addf9835b6d6523d84c6b67d721cb24362feb749a8498f7728e965d12761fd5fe39739f76ea22ac34440eb59603c1a54a6b3b38bc44cebb2dca216a5200711329a3a6aaa732672c85c42ff5884765d8813a2d10a6bc4e55cd8cdb72cdd4b339ad8ebe"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0x108, 0x117, 0x2, 0xf2, "c8a931edb4e2849f4399a319446f67fffdf16c3a1d2732b38c35f5c53a6c9592c8a3e808ac2a02ad0b315f60959851c0a5ec2acf94569059d724cdd4afd5a6d4a9eaf3825b3da2d96561c26aba5ba01442328796bdba18762bd2111acce82f5bc3e192f1d1fa9a89d73a6f706c37a65d424378c0de33c1fe15e6dd38de5d6be2030348dc05a3dacfaade7a57f3f126d3b85c698823201bb873c9a9853a14e0c14a9174d4b9a372df4a9d2c6bd3482e8282684faf312e0b75db5248b9a78f3a683b01071c51653f05461d033ccd0ca8b2274e4b0dfad12bf85a43dd7faed37664c1018433f88572d8baedbc48dd52daeb756d"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x1f}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x12f0, 0x24004001}], 0x2, 0x40000) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35332de39c5a0000000076412c47ac5fe4b39eda25c7a6c4679681a12b5ccfe44989e5bd61191284410bd1c83ea5f911a70a02dce0d89ae238b5803bfb2943460675d9a01a") fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {}, [], {0x4, 0xfffffffffffffffd}, [], {0x10, 0x2}, {0x20, 0xfffffffffffffffc}}, 0x24, 0x0) 13:41:07 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x100, 0x2c0040) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)={r0}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0xd803}) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f00000001c0)=0xffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000480)=""/117, 0xffffff55}], 0x1) dup3(r3, r1, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:41:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:08 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xc0002, 0x0) write$binfmt_elf64(r0, &(0x7f00000017c0)=ANY=[@ANYBLOB="7f454c4600402004e1ffffffffffffff02003f0006000000a20200000000000040000000000000009702000000000000050000000700380002000100d30000000000000020000000ecd569390000000000000000000000004174c20500000000180d0000000000008ad700000000000061fd000000000000e6107733a803eb19b547d61cb6f37984c6cc65190f1a6d8680078d5808bf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006cfd9b29daa459f6056a7c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x996) fallocate(r1, 0x71, 0x100000000, 0x8001) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x3) sendmsg$nl_route_sched(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@getqdisc={0x24, 0x26, 0x115}, 0x24}}, 0x0) recvmmsg(r2, &(0x7f0000000d40)=[{{&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)=""/68, 0x44}}], 0x1, 0x0, &(0x7f0000000dc0)={0x77359400}) write$nbd(r1, &(0x7f00000002c0)={0x67446698, 0x1, 0x4000000000000002, 0x2, 0x4, "60f14619e4ee0b21104ceadc17e7a0c6989409c05b0042a45876999e457be4dbc3b98c909dc447e61cfd070776d98364aa27aedea5d107c17e9fbe6c2da6c28bfc5c2a0bddad5a11f9eb40f76a26afd2e24d4b736d98d7791284c5b5330c2b83ad203a94cd607b561eb81cec595f7c323217e4dfc5b66936b975e5ac5098d82f36f56fb31e938c22633f6ebf3b1d967a7a5cd8f2fc971461f47d21d0e40363199b0af154075b75b03e4195efefb445be3885175a4a534d"}, 0x44) 13:41:08 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400)={r1, 0x9, 0xfaac, 0x4}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0xffffffffffffff9c}, 0x10) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000380)=""/79) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7b, &(0x7f0000000040)={r1, 0xfec5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x7a, &(0x7f00000000c0)={r3}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000440)) readv(r4, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x3f) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r6 = dup2(r4, r5) openat(r6, &(0x7f0000000140)='./file0\x00', 0x0, 0x3) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x6, 0x8, 0x4, 0x0, 0x5, [{0x0, 0x86f, 0x2c09e0af, 0x0, 0x0, 0x2c00}, {0xfff, 0x2, 0x2, 0x0, 0x0, 0x400}, {0x5, 0x0, 0x1, 0x0, 0x0, 0x1000}, {0x81, 0xffffffffffff0001, 0x2, 0x0, 0x0, 0x208e}, {0x3, 0x8001, 0x3f, 0x0, 0x0, 0xa}]}) ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000000c0)) [ 343.202400] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 343.228976] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:41:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}], 0xfffffffffffffeb5) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000800)=0xfffffffffffffda8) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0xd2) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8240, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x7, 0xe, 0x10, "cc522bbc60d8d2cb230aaa10ea3052c351f81c06a253d23e054672f40470d4e6e57cc197e0e2a912d778f19f39e16508e09094160b4fee287d0fed07d338f153", "37f3d4f203c62290c3e08bbfc2708177016346785f6255477e871a58a3167001", [0x9, 0x4]}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r2, 0x60}], 0x1, &(0x7f0000000240)={r3, r4+30000000}, &(0x7f0000000280)={0x90}, 0x8) dup2(r1, r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) 13:41:08 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:09 executing program 2: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x10880, 0x20) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', 'proc}vmnet1$\x00'}, &(0x7f0000000100)="2d6264657673656c662b6c6f7365637572697479776c616e317070703173656c66892a00", 0x24, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) readv(r3, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r3, r2, 0x400000000008, 0x0) tee(r1, r4, 0x6, 0xa) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000a80)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:09 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r2 = dup2(r0, r1) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000100)=""/88) accept4$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x80000) 13:41:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x0) 13:41:09 executing program 7: mlockall(0x44) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x2, 0x4d, 0x72, &(0x7f00000000c0)="e9116e2dcd115fe230392feb187306fa65a8a3779814d9eb03098c14cc8ab10079540fa6738a8ea2fa15e4ed15dc4cc4b7d28dff4cf6a05a658b8549f484a6cf6cd87979812410877cc23aeaeca7ab7e9fe8bd881ea51f275e826c1fd31053e47f8fc38cfb411952c572b5866e1189e2862b"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x3f) dup2(r1, r2) 13:41:09 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x7, &(0x7f0000000080)="153f950700f56234488dd2c48c35c4cdfd7eb80a2e74b0954d4e7421c00020cdc398235b9240b27d3ea105865b038357150491fa678c9006767e63b2ea0aaa766b0925250000000000000000000000") readv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000180)=""/192, 0xc0}, {&(0x7f0000000240)=""/185, 0xb9}, {&(0x7f0000000300)=""/120, 0x78}, {&(0x7f0000000000)=""/49, 0x31}, {&(0x7f0000000380)=""/150, 0x96}], 0x6) r1 = socket$inet6(0xa, 0x1, 0x0) syz_open_dev$vcsn(&(0x7f00000004c0)='/dev/vcs#\x00', 0x7ff, 0x240) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400)={r1, 0x9, 0xfaac, 0x4}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0xffffffffffffff9c}, 0x10) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000380)=""/79) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7b, &(0x7f0000000040)={r1, 0xfec5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x7a, &(0x7f00000000c0)={r3}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000440)) readv(r4, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x3f) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r6 = dup2(r4, r5) openat(r6, &(0x7f0000000140)='./file0\x00', 0x0, 0x3) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x6, 0x8, 0x4, 0x0, 0x5, [{0x0, 0x86f, 0x2c09e0af, 0x0, 0x0, 0x2c00}, {0xfff, 0x2, 0x2, 0x0, 0x0, 0x400}, {0x5, 0x0, 0x1, 0x0, 0x0, 0x1000}, {0x81, 0xffffffffffff0001, 0x2, 0x0, 0x0, 0x208e}, {0x3, 0x8001, 0x3f, 0x0, 0x0, 0xa}]}) ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000000c0)) 13:41:09 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef632700000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) r8 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) ioctl$SG_EMULATED_HOST(r9, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) sendmsg$rds(r1, &(0x7f0000002340)={&(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/201, 0xc9}, {&(0x7f0000001340)=""/4096, 0x1000}], 0x4, &(0x7f00000001c0)=[@rdma_dest={0x18, 0x114, 0x2, {0x6, 0x3e}}], 0x18, 0x4}, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x6, 0x0, 0x709000}}) 13:41:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x11d}, 0xfc6f) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000200)={0x4, 0x1, 0x3ff, 0x5, 0x100000001, 0x80000001}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000fd0000000000006110000000000000000000000000000d86936f442f43d2ce00950000000000000053db68c5757621f3f81f436fdbd0cc7483bace3bc08d6e0a5c4d50c86cd347d8576a2b890c44818a86f2361a2b9d135f1bf32b1be452ca55525b26210997273d2303dc44309a"], &(0x7f0000f6bffb)='GPL\x00', 0x4, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000240)={{0xff, @empty, 0x4e20, 0x4, 'sh\x00', 0x4, 0x6ae, 0x20}, {@multicast1, 0x4e20, 0x10002, 0x6, 0x40, 0xffffffff80000001}}, 0x44) 13:41:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x0) 13:41:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)=0x4) bind$netlink(r1, &(0x7f0000000000), 0xe5a637258ec58c08) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast2, @rand_addr}, &(0x7f0000000680)=0xc) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000006c0)={@loopback, r2}, 0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@empty, 0x5, 0x2, 0x3, 0x0, 0x4, 0x6, 0x80}, 0x20) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000040)={'\x00', {0x2, 0x4e20}}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x10000, 0x0) accept$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) r4 = socket(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000500)={r1, r0, 0x7, 0x8000, &(0x7f00000002c0)="cc358df0b7a528425f711b5acc828097e22c22340b380a5d99bcd58a0e2609a491f3e972d882fba54fed183d3b6edd4243072c1c68707d1778576cfe1ad29f4124306a57bed89346b818d58d88becc14a4bb6fbb133d209d001062863e1378b43ec3094aa391833169a6b35bdc66e0daf5e608046f155e8417d3cc9abae5dc31fda98db0", 0x9, 0x401, 0x8e9, 0x0, 0x0, 0x0, 0x8, "d97951ec32ab4316bf5ae06d23293a3c03b9dcbcd9b50e9ef5831d79ac7d98de40399c4f1f998a6ff913cf4326ee16ef577cda6b07e5e824bd561dcd2980f777db6bd048bf309efa9f1c76ad95eb07a9b069ebb77c00999e509238381b9d0556b93187211f9777979692f9b51bc459fd24468b5a44c37aa4d65067aaf9d0457bca8267a99b51e2639e9dcfe14dad13d750bded7ef8e04e984f2b7eeab8dc70e9130e898ae888f5e876641adda59e1d82d88071b51ae2a47fa354888b7e48f5601c35a8452b56bd2c325b4ed4221cb794e3adcc840ca767e852c2bbcc02c16fd4d76dadd2a010ad"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) 13:41:10 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) r4 = shmget(0x1, 0x4000, 0xa, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x208000) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0x9) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:10 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x10880, 0x20) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', 'proc}vmnet1$\x00'}, &(0x7f0000000100)="2d6264657673656c662b6c6f7365637572697479776c616e317070703173656c66892a00", 0x24, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) readv(r3, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r3, r2, 0x400000000008, 0x0) tee(r1, r4, 0x6, 0xa) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:10 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x8, 0x0, 0x9000}, 0x4) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x81, 0x50000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x3}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000340)={r3, 0x7}, &(0x7f0000000380)=0x8) r4 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x800) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000100)={@rand_addr, @dev}, &(0x7f0000000140)=0xc) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r5 = dup2(r0, r1) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, &(0x7f0000000200)={{0x0, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x8, 0x44d, 0x2d}, {@multicast2, 0x4e23, 0x2000, 0x400, 0x2d0, 0x7}}, 0x44) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000180)={'syzkaller1\x00', {0x2, 0x4e24}}) 13:41:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x0) 13:41:10 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000800), 0xe4af76c076e9649c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:10 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r0, 0x3ff) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0xff, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) 13:41:10 executing program 7: io_setup(0x2, &(0x7f0000000300)=0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) io_pgetevents(r0, 0xfff, 0x7, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000480)={r1, r2+10000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r3, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000140)={0x8, 0x9, 0x1ff4e326}) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x3f) r5 = dup2(r3, r4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0xc04c5349, &(0x7f00000000c0)={0x10001, 0xfffffffffffffc01, 0x3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="4e0000002d5ab7f316edb6b0379d5dfc314fd13db33f7f673b16378a8797ff321d65d1ea850f78d3ea5fa8676279a727a2df906128387d170bbd0f5383938027554b443fc0d6f047a24191d9e576185c02e9"], &(0x7f00000002c0)=0x56) [ 345.869398] FAULT_INJECTION: forcing a failure. [ 345.869398] name failslab, interval 1, probability 0, space 0, times 0 [ 345.880944] CPU: 0 PID: 14968 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 345.888249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.897629] Call Trace: [ 345.900285] dump_stack+0x14b/0x190 [ 345.903955] should_fail+0xa98/0xaa0 [ 345.907721] __should_failslab+0x278/0x2a0 [ 345.912029] should_failslab+0x29/0x70 [ 345.915967] kmem_cache_alloc_node+0x156/0xc00 [ 345.920603] ? __alloc_skb+0x201/0x9e0 [ 345.924587] ? netlink_autobind+0x9bd/0xa20 [ 345.928998] __alloc_skb+0x201/0x9e0 [ 345.932811] netlink_sendmsg+0xb49/0x1290 [ 345.937065] ___sys_sendmsg+0xe70/0x1290 [ 345.941281] ? kstrtoull+0x6e1/0x790 [ 345.945051] ? netlink_getsockopt+0x11c0/0x11c0 [ 345.949816] ? __fget_light+0x53/0x700 [ 345.953788] ? __fdget+0x4e/0x60 [ 345.957225] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 345.962667] ? __fget_light+0x6a3/0x700 [ 345.966736] __sys_sendmmsg+0x4ac/0x930 [ 345.970885] ? prepare_exit_to_usermode+0x46/0x410 [ 345.975888] ? syscall_return_slowpath+0xdb/0x700 [ 345.980849] __se_sys_sendmmsg+0xbd/0xe0 [ 345.984971] __x64_sys_sendmmsg+0x56/0x70 [ 345.989169] do_syscall_64+0xb8/0x100 [ 345.993024] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.998263] RIP: 0033:0x457099 [ 346.001525] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:41:11 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x6, 0xa4000) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x3, 0xffffffffffffff61, 0x7fffffff, 0x6, 0x0, 0x2, 0x0, 0xd, 0xc00, 0x7, 0x7, 0x3, 0xfffffffffffffffe, 0xfff, 0x20, 0x7fff, 0x5, 0xfffffffffffff3bf, 0x8001, 0x100, 0x7fffffff, 0x1ff, 0x5, 0x4, 0x8, 0x855f, 0xab1, 0x4, 0xfffffffffffffff7, 0x0, 0xffff, 0x80000001, 0x6, 0x6, 0x7, 0x6, 0x0, 0xffffffffffffffff, 0x1, @perf_config_ext={0x9, 0xc00000000}, 0x10003, 0x0, 0x4, 0x7, 0x5, 0x4, 0xff}, r1, 0x10, r2, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8080}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r4, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r5 = socket$inet6(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_int(r5, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:11 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file1\x00', 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='./file0\x00') r0 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) r2 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() fstat(0xffffffffffffff9c, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) r10 = getegid() stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {0x1, 0x7}, [{0x2, 0x5, r0}, {0x2, 0x4, r1}, {0x2, 0x3, r2}, {0x2, 0x5, r3}, {0x2, 0x5, r4}, {0x2, 0x0, r5}], {0x4, 0x2}, [{0x8, 0x1, r6}, {0x8, 0x4, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x0, r10}, {0x8, 0x1, r11}], {0x10, 0x3}}, 0x84, 0x3) [ 346.020470] RSP: 002b:00007efd28985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 346.028255] RAX: ffffffffffffffda RBX: 00007efd289866d4 RCX: 0000000000457099 [ 346.035561] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 346.042954] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 346.050305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 346.057623] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000000 13:41:11 executing program 5: fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f0000000040)='-\x00', 0x2, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x9, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x2, @remote}}, 0x1e) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000180)={0xf8e6, 0xffffffffffffffc0, 0x1, @random="a9fd9de08824", 'vcan0\x00'}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 13:41:11 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) flistxattr(r0, &(0x7f0000000200)=""/4096, 0x1000) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:41:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) fsync(0xffffffffffffffff) r3 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000000)={0x1, {0x0, 0x989680}, 0x0, 0x7}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='nr0\x00', 0x10) 13:41:11 executing program 4: unshare(0x24000004) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x7, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000140)=0x6, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x100000, 0x200) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f00000000c0)=0xc3) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 13:41:11 executing program 6: r0 = socket$inet6(0xa, 0x806, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f00000008c0)='/dev/input/event#\x00', 0x2, 0x400207) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0x1292100, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, 0xffffffffffffffff, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="30353c54a422df9f4f8600af8f1968a36fb208581e512c27000000400023a621d0e1692de78736ffa58e63ab0100000000660602516e63da9b9d568792834c8f6354d584703905000000000000000eefceb6a8b7cea2c4f0f60391567f00008932960fd6157dd631ae2309059736e37d4acf0600681700000000000000000000000000000000000216b5e45dc43214e08d1887ac99f2f525aa2a4a70a8ba91d174add899035988ffbfe81816360d102f83b5024d1a5372d6632e25f1582cb92bc7f3e1e257b629bf7fb0260cbe069c8ba49d9048aed5f2978afc4bb9fdb881d5fdf6731d7fb43a35a7dd75d96a9ab1b6d5886eaa8a7941fe5445ace185ffec70b86493d70c5262aa4e066fdf58479f39"]) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000540)=0x3) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x2000, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000b00)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000500)={'bond0\x00', {0x2, 0x4e21, @multicast2}}) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:11 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r1) 13:41:11 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x10880, 0x20) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', 'proc}vmnet1$\x00'}, &(0x7f0000000100)="2d6264657673656c662b6c6f7365637572697479776c616e317070703173656c66892a00", 0x24, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) readv(r3, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r3, r2, 0x400000000008, 0x0) tee(r1, r4, 0x6, 0xa) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:11 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x111, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140), r1}}, 0x20) 13:41:11 executing program 3 (fault-call:4 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:11 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3) membarrier(0x1, 0x0) dup2(r0, r1) 13:41:11 executing program 4: r0 = socket$inet6(0xa, 0x806, 0x9) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001780)="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", 0x2cb}], 0x1, &(0x7f0000000380)}, 0xc100) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x2b9}], 0x1, &(0x7f0000000080)}, 0x8000) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0xc8, &(0x7f0000000280)}, 0x0) [ 346.954983] FAULT_INJECTION: forcing a failure. [ 346.954983] name failslab, interval 1, probability 0, space 0, times 0 [ 346.966469] CPU: 0 PID: 15049 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 346.973790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.983181] Call Trace: [ 346.985862] dump_stack+0x14b/0x190 [ 346.989548] should_fail+0xa98/0xaa0 [ 346.993346] __should_failslab+0x278/0x2a0 [ 346.997650] should_failslab+0x29/0x70 [ 347.001598] __kmalloc_node_track_caller+0x23f/0x1160 [ 347.006837] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 347.012315] ? netlink_sendmsg+0xb49/0x1290 [ 347.016739] ? netlink_sendmsg+0xb49/0x1290 [ 347.021166] __alloc_skb+0x2f5/0x9e0 [ 347.024944] ? netlink_sendmsg+0xb49/0x1290 [ 347.029382] netlink_sendmsg+0xb49/0x1290 [ 347.033634] ___sys_sendmsg+0xe70/0x1290 [ 347.037762] ? kstrtoull+0x6e1/0x790 [ 347.041565] ? netlink_getsockopt+0x11c0/0x11c0 [ 347.046318] ? __fget_light+0x53/0x700 [ 347.050273] ? __fdget+0x4e/0x60 [ 347.053713] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 347.059248] ? __fget_light+0x6a3/0x700 [ 347.063336] __sys_sendmmsg+0x4ac/0x930 [ 347.067397] ? prepare_exit_to_usermode+0x46/0x410 [ 347.072401] ? syscall_return_slowpath+0xdb/0x700 [ 347.077349] __se_sys_sendmmsg+0xbd/0xe0 [ 347.081465] __x64_sys_sendmmsg+0x56/0x70 [ 347.085662] do_syscall_64+0xb8/0x100 [ 347.089524] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.094759] RIP: 0033:0x457099 [ 347.098032] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.116964] RSP: 002b:00007efd28985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 347.124747] RAX: ffffffffffffffda RBX: 00007efd289866d4 RCX: 0000000000457099 [ 347.132053] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 347.139353] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 347.146661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 13:41:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/127, &(0x7f00000000c0)=0x7f) r1 = syz_open_procfs(0x0, &(0x7f0000000580)="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") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000004, 0x10012, r1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) [ 347.153992] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000001 [ 347.309908] IPVS: length: 127 != 24 [ 347.332849] IPVS: length: 4194704 != 402653208 13:41:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d001ccea02e45d9ff27e1652124588526374a9ec5b5e1f342af624e93c7dc00772a3f772ba76a2220be51c9a9ec06395f04cdfdc95a5cd37f8c6d8737b481bfb1ee691b7cd3e97e03ce6500942e19efb193f1d8aab0702fb3f1f1f39fdacc708787970d1ab473c1104c3ad384d385ff4d8389aa039fecc4c85541dc41bcac7a8f"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) io_destroy(0x0) recvmmsg(r0, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/68, 0x44}], 0x2, &(0x7f0000001500)=""/135, 0x87, 0x87b}, 0x2}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f00000015c0)=""/161, 0xa1}, {&(0x7f0000000380)=""/39, 0x27}, {&(0x7f00000003c0)=""/23, 0x17}, {&(0x7f0000001440)=""/51, 0x33}, {&(0x7f0000001680)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0x401}, 0x6}, {{&(0x7f0000002700)=@un=@abs, 0x80, &(0x7f0000002880)=[{&(0x7f0000002780)=""/245, 0xf5}], 0x1, 0x0, 0x0, 0xda}}, {{&(0x7f00000028c0)=@ax25, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002940)=""/118, 0x76}, {&(0x7f00000029c0)=""/6, 0x6}, {&(0x7f0000002a00)=""/242, 0xf2}, {&(0x7f0000002b00)=""/180, 0xb4}, {&(0x7f0000002bc0)}, {&(0x7f0000002c00)=""/30, 0x1e}], 0x6, &(0x7f0000002cc0)=""/20, 0x14, 0xeb3}, 0x4}], 0x4, 0x20, &(0x7f0000002e00)) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000400)=0x200008000) write$vnet(r1, &(0x7f00000001c0)={0x1, {&(0x7f0000000240)=""/207, 0xcf, &(0x7f0000001480)=""/104, 0x1, 0x2}}, 0x68) 13:41:12 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) write$P9_RATTACH(r2, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0xc1, 0x1, 0x5}}, 0x14) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000100)) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:41:12 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:41:12 executing program 5: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x10000) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x2, {0xa, 0x0, 0x5, @mcast2}}}, 0x38) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000180)={0x20f, @time}) 13:41:12 executing program 3 (fault-call:4 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:12 executing program 0: r0 = socket$inet6(0xa, 0x101000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f00000001c0)="025cc80700145f8f764070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x80) r2 = semget$private(0x0, 0x1, 0x200) semctl$GETVAL(r2, 0x7, 0xc, &(0x7f0000000400)=""/143) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0xffff) accept$unix(r1, &(0x7f0000000200), &(0x7f0000000140)=0xffffffffffffff02) pselect6(0x2ed, &(0x7f0000000180), &(0x7f0000000040), &(0x7f0000000300)={0x0, 0x0, 0x0, 0x800000000000}, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 13:41:12 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f0000000080)=0x0) io_cancel(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xa, 0x0, r3, &(0x7f00000000c0)="9e947fd58a550125c261a45d4dffc4d592c293e3fa36665cc292a3cc86a220c2d649a46fb6ca0e265ffa2091f93b9a7b425042be577e00defb6434e63d43806202314304e5752d42eaa64211a0028623017b7f", 0x53, 0x4, 0x0, 0x1, r3}, &(0x7f0000000180)) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) close(r0) [ 347.777458] FAULT_INJECTION: forcing a failure. [ 347.777458] name failslab, interval 1, probability 0, space 0, times 0 [ 347.788927] CPU: 1 PID: 15091 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 347.796246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.805652] Call Trace: [ 347.808306] dump_stack+0x14b/0x190 [ 347.811986] should_fail+0xa98/0xaa0 [ 347.815756] __should_failslab+0x278/0x2a0 [ 347.820056] should_failslab+0x29/0x70 [ 347.823996] kmem_cache_alloc_node+0x156/0xc00 [ 347.828637] ? __alloc_skb+0x201/0x9e0 [ 347.832634] __alloc_skb+0x201/0x9e0 [ 347.836392] ? __msan_get_context_state+0x9/0x30 [ 347.841246] netlink_sendmsg+0xb49/0x1290 [ 347.845515] ___sys_sendmsg+0xe70/0x1290 [ 347.849678] ? kmsan_internal_chain_origin+0x128/0x210 [ 347.855073] ? netlink_getsockopt+0x11c0/0x11c0 [ 347.859832] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.864742] ? __msan_poison_alloca+0x173/0x1f0 [ 347.869481] ? rcu_all_qs+0x2e/0x1f0 [ 347.873305] ? _cond_resched+0x38/0xc0 [ 347.877270] ? rcu_all_qs+0x2e/0x1f0 [ 347.881067] ? __sys_sendmmsg+0x6c6/0x930 [ 347.885316] __sys_sendmmsg+0x4ac/0x930 [ 347.889363] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.894284] ? __msan_poison_alloca+0x173/0x1f0 [ 347.899052] __se_sys_sendmmsg+0xbd/0xe0 [ 347.903180] __x64_sys_sendmmsg+0x56/0x70 [ 347.907386] do_syscall_64+0xb8/0x100 [ 347.911232] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.916510] RIP: 0033:0x457099 [ 347.919745] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.938728] RSP: 002b:00007efd28985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 347.946492] RAX: ffffffffffffffda RBX: 00007efd289866d4 RCX: 0000000000457099 [ 347.953811] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 347.961124] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 347.968421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 13:41:12 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000800)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 347.975724] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000002 13:41:13 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5450, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:41:13 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x3, @empty, 0x7}, 0x1c) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) 13:41:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10000000000010) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) write(r0, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 13:41:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000080)) r2 = dup2(r0, r0) r3 = getpid() setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x81, 0x4) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) getpeername(r2, &(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f00000001c0)=0x80) 13:41:13 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000001200), &(0x7f0000001240)="ca", 0xffffffef, 0xfffffffffffffffd) getgroups(0x2, &(0x7f0000002240)=[0xee00, 0xffffffffffffffff]) keyctl$chown(0x4, r0, 0x0, r1) 13:41:13 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000000c0)) readv(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000100)={0x1, 0x3ff, 0x35, 0x7, 0x7}) 13:41:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x4000)=nil, 0x4000, 0x1, 0x2000000000000032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) ioctl$sock_inet_SIOCGARP(r3, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x0, @local}, 0x0, {}, 'vcan0\x00'}) close(r3) dup3(r0, r2, 0x0) 13:41:13 executing program 3 (fault-call:4 fault-nth:3): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') fcntl$dupfd(r1, 0x406, r1) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000100)={r2, 0x1, 0x6, @random="3699e7475e7b"}, 0x10) 13:41:13 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6(0xa, 0x20000000001, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7f, 0x400000) fcntl$getown(r0, 0x9) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = getpgrp(0x0) ptrace$getenv(0x4201, r2, 0x1, &(0x7f0000000040)) 13:41:13 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000100660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() [ 348.720555] FAULT_INJECTION: forcing a failure. [ 348.720555] name failslab, interval 1, probability 0, space 0, times 0 [ 348.732003] CPU: 0 PID: 15155 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 348.739304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.748678] Call Trace: [ 348.751322] dump_stack+0x14b/0x190 [ 348.755052] should_fail+0xa98/0xaa0 [ 348.758858] __should_failslab+0x278/0x2a0 [ 348.763157] should_failslab+0x29/0x70 [ 348.767096] __kmalloc_node_track_caller+0x23f/0x1160 [ 348.772328] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 348.777733] ? netlink_sendmsg+0xb49/0x1290 [ 348.782162] ? netlink_sendmsg+0xb49/0x1290 [ 348.786601] __alloc_skb+0x2f5/0x9e0 [ 348.790354] ? netlink_sendmsg+0xb49/0x1290 [ 348.794756] netlink_sendmsg+0xb49/0x1290 [ 348.799008] ___sys_sendmsg+0xe70/0x1290 [ 348.803344] ? kstrtoull+0x6e1/0x790 [ 348.807116] ? netlink_getsockopt+0x11c0/0x11c0 [ 348.811916] ? kmsan_set_origin_inline+0x6b/0x120 13:41:13 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) [ 348.816843] ? __msan_poison_alloca+0x173/0x1f0 [ 348.821580] ? rcu_all_qs+0x2e/0x1f0 [ 348.825375] ? _cond_resched+0x38/0xc0 [ 348.829340] ? rcu_all_qs+0x2e/0x1f0 [ 348.833137] ? __sys_sendmmsg+0x6c6/0x930 [ 348.837377] __sys_sendmmsg+0x4ac/0x930 [ 348.841456] ? prepare_exit_to_usermode+0x46/0x410 [ 348.846468] ? syscall_return_slowpath+0xdb/0x700 [ 348.851418] __se_sys_sendmmsg+0xbd/0xe0 [ 348.855541] __x64_sys_sendmmsg+0x56/0x70 [ 348.859730] do_syscall_64+0xb8/0x100 [ 348.863635] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 348.868856] RIP: 0033:0x457099 [ 348.872093] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.891031] RSP: 002b:00007efd28964c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 348.898802] RAX: ffffffffffffffda RBX: 00007efd289656d4 RCX: 0000000000457099 [ 348.906127] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000003 [ 348.913429] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 348.920744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 348.928060] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000003 13:41:14 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:14 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r2, 0xa, 0x1a) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:14 executing program 5: r0 = socket$inet(0x10, 0x3, 0x80000000) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="0cad620ecfee48eba66da5e090fb41388dc9796f8ddb311dd46182a68436b6fefe8e06926dbf7c681ad14fbeea0e13d4d5aa44a7b4a65c5296d6bac235e25b26538f769c6f67c9991e", 0x49}, {&(0x7f00000002c0)="d38d50c7a2df3cf9b05f0876fcd664714a3424c3ba6a800887a0ae30c6602e0a454771768f4818e030abc2195cdf8d6b42c9693a451445d02234946582272205e1a84a072cd10f861bff98abb6a088cc69eaa9e0b43418887c1c88d9fdbbe5cebbb56cad2f32b85b9bf3007ca78b96f5745e75760fab3b4e8135436555163be8b07f632cc4f8c92b56c865459e288104b4ad6882d5777c6710813e32df7483335b8b28106357f2448bbd582c2499e578c8a015dd64ec8d1517abbc9f81096b1662070ce497ef246633beb0", 0xcb}, {&(0x7f00000003c0)="42a2a550b789a585f0c19ad19fce773f219fb033ddd3e99bbc1fbeda4b54609e2ce86995f6c6b8c2b7b52e87403da50462b510e75c0fd2459a0be835c8abe4baf86f6836c9b296199cd2af03b1014f0709b8c3ab96e3e9ff2a2cae9ffd92018c69ee86caf29dd07e204d546f320e49358c7adef2b7dfd33ce48f16e3d14e9c34170ad705f6a1b8a638792e74c7c6c9fb94ffc3fa49c58c9a9f02a2c8351c83fb58c557df82faf90ea1f349dde2323773bdb20d4616103071a018e1c6dc0828489faa80c2a089e5e1d9a096f39b98958579c1d1ac857c55d42ab1c5e634b7148ced4508a4e6effde60e7a2b20654b61e717", 0xf1}, {&(0x7f0000000080)="da7c8f460aaca806eb3bfec4660843a7e5bab429f989814806ee34af44fc878fcfcaeedea798003cf0ce3b196a115a", 0x2f}, {&(0x7f00000004c0)="6882ced63f93f83f17109f871ab39070b1d4ca622b0b130ca51a928527f53069bd34546afa30216e18899b886aa96e577b0f8829aee1208663d2ad8def7aa99571f09297ec2a081763514a54fd9a9fc8481426d4f3b1c1c9e403f7c15d39180a6f4ad953f7df7cf07a8a00eb9728cc9880f59fe9d836ebc39c2e6cdf33e8be032f0da327a251f8fb7cb1069d0dc956124312efd29f0bf73e11c5df007b77815b24", 0xa1}], 0x5}, 0x0) 13:41:14 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x9, 0x8002, 0x0, 0x45da, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=r2, &(0x7f0000000380)=0x4) r3 = getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) tgkill(r3, r4, 0xc) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)={0x0, {{0xa, 0x4e24, 0x80000000, @mcast2, 0x6}}, 0x1, 0x9, [{{0xa, 0x4e24, 0x0, @mcast1, 0x100000000}}, {{0xa, 0x4e20, 0x2, @loopback, 0x21c}}, {{0xa, 0x4e24, 0x2fb, @dev={0xfe, 0x80, [], 0x14}, 0xacf}}, {{0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0x20}, 0x4}}, {{0xa, 0x4e21, 0x200, @loopback, 0x9}}, {{0xa, 0x4e20, 0xfff, @local, 0x6}}, {{0xa, 0x4e23, 0x1, @local, 0xfa}}, {{0xa, 0x4e22, 0x0, @empty, 0x8}}, {{0xa, 0x4e20, 0x2, @empty, 0x10001}}]}, 0x510) sendto$inet(r1, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r5, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x90) bind$netlink(r5, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfc, 0x8000000}, 0xc) write$UHID_GET_REPORT_REPLY(r5, &(0x7f0000000280)={0xa, 0xa, 0xfffffffffffffffe, 0x1}, 0xa) 13:41:14 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 13:41:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:14 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x283) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000002d40)='/dev/sequencer\x00', 0x80000, 0x0) accept$alg(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:14 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x6) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r3 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x6, 0x10000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) mkdirat(r3, &(0x7f0000000140)='./file0\x00', 0xe2) dup2(r0, r1) 13:41:14 executing program 3 (fault-call:4 fault-nth:4): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:14 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 13:41:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000100660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:14 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) getpid() socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:14 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x121000) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x60000000000, 0x2}, &(0x7f0000000080)=0xffffffffffffffd9) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0xb20c00000000000, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x13, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000100), &(0x7f0000000080)=0x5) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) 13:41:14 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:15 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:15 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x1aa) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r4, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xca2b}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x54}}, 0x40000) write(r3, &(0x7f00000001c0), 0xfffffef3) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000240)=0x8001) tee(r0, r3, 0x6, 0xa) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185502c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d46c2fffb00f77691567fac148932520fd6157dd631ae2309059736e3090000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x2000400) r1 = memfd_create(&(0x7f0000000080)='ppp0\x00', 0x0) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000140)='comm\x00') fchmod(r3, 0x3) r4 = dup2(r3, r1) execveat(r4, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000040)={0xfffffffffffffffb, 0x1ff, 0x200, 0x7, 0xfff}) 13:41:15 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget$private(0x0, 0x3, 0x400) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f00000000c0)=""/96) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:41:15 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:15 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10001) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000065920cce74d964c745765369ed632a00ec301b7a1cb44cf5f33ad1acb2102a97b70feeaf351a06f44d1d41b3d6fb07ef2547b80e6eca0cbab846455c30cd6036f5a9d5b23d9b0a79998b1baf5eb2ab1646adbda681219fe157bef661c1c28d7bf1776013929465ab8e791d2c6d5d4f43cbdf4cab01e9d616541488", @ANYRES16=r3, @ANYBLOB="000727bd7000fedbdf251000000020000300140002006263736830000000000000000000000008000400a60000000800050005000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000004}, 0x8000) creat(&(0x7f0000000240)='./file0\x00', 0x90) getsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:15 executing program 4: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x0, @local}, 0x10) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x5, 0x4, 0x101}) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000040)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f00000002c0), 0x0, &(0x7f0000000300)}, 0x4000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) [ 350.357211] FAULT_INJECTION: forcing a failure. [ 350.357211] name failslab, interval 1, probability 0, space 0, times 0 [ 350.368579] CPU: 0 PID: 15267 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 350.375884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.385265] Call Trace: [ 350.387908] dump_stack+0x14b/0x190 [ 350.391609] should_fail+0xa98/0xaa0 [ 350.395515] __should_failslab+0x278/0x2a0 [ 350.399820] should_failslab+0x29/0x70 [ 350.403797] kmem_cache_alloc_node+0x156/0xc00 [ 350.408433] ? rtnetlink_rcv_msg+0x1435/0x1530 [ 350.413054] ? __alloc_skb+0x201/0x9e0 [ 350.417024] __alloc_skb+0x201/0x9e0 [ 350.420826] ? __msan_poison_alloca+0x173/0x1f0 [ 350.425599] netlink_ack+0x568/0x1140 [ 350.429489] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.434437] netlink_rcv_skb+0x302/0x5f0 [ 350.438569] ? rtnetlink_bind+0x120/0x120 [ 350.442773] rtnetlink_rcv+0x50/0x60 [ 350.446572] netlink_unicast+0x1638/0x1720 [ 350.450859] ? rtnetlink_net_exit+0x90/0x90 [ 350.455283] netlink_sendmsg+0x1205/0x1290 [ 350.459625] ___sys_sendmsg+0xe70/0x1290 [ 350.463763] ? kstrtoull+0x6e1/0x790 [ 350.467600] ? netlink_getsockopt+0x11c0/0x11c0 [ 350.472345] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.477258] ? __msan_poison_alloca+0x173/0x1f0 [ 350.482012] ? rcu_all_qs+0x2e/0x1f0 [ 350.485826] ? _cond_resched+0x38/0xc0 [ 350.489812] ? rcu_all_qs+0x2e/0x1f0 [ 350.493607] ? __sys_sendmmsg+0x6c6/0x930 [ 350.497852] __sys_sendmmsg+0x4ac/0x930 [ 350.501911] ? prepare_exit_to_usermode+0x46/0x410 [ 350.506915] ? syscall_return_slowpath+0xdb/0x700 [ 350.511874] __se_sys_sendmmsg+0xbd/0xe0 [ 350.515995] __x64_sys_sendmmsg+0x56/0x70 [ 350.520187] do_syscall_64+0xb8/0x100 [ 350.524049] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 350.529293] RIP: 0033:0x457099 [ 350.532541] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:41:15 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 350.551478] RSP: 002b:00007efd28985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 350.559271] RAX: ffffffffffffffda RBX: 00007efd289866d4 RCX: 0000000000457099 [ 350.566591] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 350.573900] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 350.581240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 350.588581] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000004 13:41:16 executing program 3 (fault-call:4 fault-nth:5): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:16 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:16 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) ioctl$SG_GET_COMMAND_Q(r0, 0x1267, &(0x7f0000000080)) 13:41:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xf, &(0x7f0000000000)="e416cf60c525a489263ab222c1edce9f4cf647ba123af3f7ac60b70dfb97ed3e3095621b4db72f143da1a9c40358d4f0956be9236db9f2b0f7af18f4f4ec92a1c92813dcf53ad471bd1d725b79bfe201", 0x50) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000200)=ANY=[@ANYBLOB="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"]}) 13:41:16 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200001) accept$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c) dup2(r0, r1) 13:41:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000a80)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x800, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f19512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea2ca84f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00000000000000000000000000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:16 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000000c0)=0x9, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000180)={{0x1d, @multicast1, 0x4e24, 0x3, 'nq\x00', 0x2c, 0x6, 0x57}, {@multicast2, 0x4e20, 0x1, 0x2, 0x800, 0x6}}, 0x44) prctl$setmm(0x23, 0x7, &(0x7f0000ffe000/0x2000)=nil) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 13:41:16 executing program 0: prlimit64(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) [ 351.427790] FAULT_INJECTION: forcing a failure. [ 351.427790] name failslab, interval 1, probability 0, space 0, times 0 [ 351.439289] CPU: 1 PID: 15343 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 351.446593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.455973] Call Trace: [ 351.458620] dump_stack+0x14b/0x190 [ 351.462301] should_fail+0xa98/0xaa0 [ 351.466102] __should_failslab+0x278/0x2a0 [ 351.470425] should_failslab+0x29/0x70 13:41:16 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000200)="1af278fbcd537ff5486023f88db39a22a6629ca9500001000000000000e8bb7edbefd64799312de783e4f8191d9c482393b36dc347994ca3c67cbc31e83ec801c92bb1b26f875681c93fcc20991c30354960de501cf167c13d6cf870c5afac74f6fd813ea7282a95561a927cbc55cee55b03775637fc19f6769e34cdb046257a4fc27654d63a9d56bcc349aa204863bf73c1ebc891dc60347995e698252639592bb6e963d9c33d55221be4a9ffa29a0ea60438832a21140d0f88ca55a7ae9a1b316605c6951f91d546329ead9b8d86d91a9142cc6071fba47f9d4348b5d9dd1f88dbb4", 0xffffffffffffffaa) readv(r2, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r2, r1, 0x400000000008, 0x0) tee(r0, r3, 0x6, 0xa) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x75, 0xfff, 0xffffffffffff6190}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r4, 0x1000000c5e, 0x18c}, 0xc) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:16 executing program 0: prlimit64(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget$private(0x0, 0x3, 0x400) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f00000000c0)=""/96) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) 13:41:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) finit_module(r0, &(0x7f0000000200)="6d696d655f7479706573797374656d73656375726974791a00", 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76601b") ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}}) r1 = socket$inet6(0xa, 0x3, 0x46e24f53) r2 = accept(r1, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=@newqdisc={0x8b8, 0x24, 0x100, 0x70bd27, 0x25dfdbfb, {0x0, r3, {0xc, 0xc}, {0xe, 0xfff3}, {0xffff, 0xf}}, [@qdisc_kind_options=@q_cbq={{0x8, 0x1, 'cbq\x00'}, {0x88c, 0x2, [@TCA_CBQ_FOPT={0x10, 0x3, {{0xf, 0xd}, 0x3, 0x1ff}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x1, 0x8, 0x4, 0x8001, 0x32db}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x8, 0xecb1, 0x10001, 0x8, 0x8, 0xfffffffeffffffff, 0x5, 0xd0, 0x2, 0x9, 0x0, 0x7f, 0xaafa, 0x4, 0x5, 0x4, 0x200, 0x5f, 0x9, 0x36, 0x3f, 0x81, 0x1000, 0x3, 0x7, 0x7f, 0xb769, 0x1, 0x101, 0x3, 0x3, 0x800, 0x1f, 0xbf, 0x1, 0xffffffffffffffbe, 0x8, 0x9bc, 0x2, 0x8, 0xfffffffffffffffc, 0x0, 0x100, 0x4, 0x80000001, 0xffff, 0x7f, 0x10001, 0x7, 0x4, 0x9, 0x5, 0x8, 0x4, 0xaa8e, 0x40, 0x1000, 0x9, 0x7fffffff, 0x7fff, 0xe808, 0x80000000, 0xffffffffffffffff, 0x858b, 0x4, 0x2, 0x6, 0x1, 0x10000, 0x4, 0x80000001, 0x0, 0x81, 0xd849, 0x9, 0x6, 0x8000, 0xff, 0x1ff, 0x95, 0x1, 0x401, 0x1f, 0x6, 0x1, 0x4, 0x16, 0x400, 0x5, 0x0, 0x1, 0x4, 0x3f, 0x1, 0x2, 0x6, 0x8, 0x80000001, 0x7fff, 0x6, 0x80000001, 0x8, 0x40, 0xa65, 0x6, 0x100000001, 0xe02, 0x7, 0xcf7d, 0x4, 0xfffffffffffffe00, 0xffffffff, 0x7, 0x8, 0x3, 0x0, 0x7cc397e1, 0x1ff, 0x7, 0x8, 0x7, 0x6, 0x1, 0x1176, 0x5, 0xb3d, 0x5, 0x1, 0x0, 0x8, 0x10000, 0x0, 0xff, 0x100000000, 0xa4ce, 0x2, 0xd, 0x4, 0x8, 0x7, 0x8, 0x800, 0x9eee, 0x100, 0x3ff, 0x5, 0x10001, 0xe0, 0x4, 0x9, 0x9, 0x8000, 0x7fffffff, 0x401, 0x558, 0x3ff, 0x0, 0x3ff, 0xfffffffffffffffa, 0x4, 0x10000, 0x4, 0x1, 0x1, 0xd3ee, 0x6, 0x0, 0xffffffffffffff7f, 0x4, 0x40, 0x11a, 0x7, 0x101, 0x6, 0x1, 0xffffffffffffff7e, 0x280, 0xffffffff, 0x3, 0x9, 0x7f, 0x0, 0x1f, 0x0, 0xfff, 0x2, 0x6, 0xff, 0x7, 0x0, 0xffffffff, 0x990, 0x1, 0x640, 0x2, 0xa7, 0xd7a, 0xff, 0x100, 0x1, 0x1ff, 0x80000001, 0x2577, 0x3, 0x7, 0x7, 0x100000000, 0x1, 0x2, 0x9, 0x3, 0x5, 0x4, 0xb93a, 0x8, 0x1000, 0x5, 0x6, 0x7, 0x100, 0xbed, 0x596, 0x8, 0x9, 0x9, 0x4, 0x2, 0x1, 0xfffffffffffffffd, 0x4, 0x8000, 0x9a000000000, 0x8, 0x0, 0x194, 0xd68, 0x8, 0x81, 0x3, 0x7, 0x6, 0x4, 0x80000000, 0xb8, 0x7, 0x1, 0x4, 0x7f, 0x8, 0x6, 0x3, 0x5, 0x4, 0x6, 0xd564, 0x1]}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x29, 0x3, 0x20, 0x1000, 0x1, 0x5, 0x10001, 0x5}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x3, 0x7, 0x75a7, 0x81, 0x4, 0x4, 0xfff, 0x40, 0x101, 0x1, 0x100, 0x0, 0x7, 0x9, 0x100000000, 0x5, 0x1, 0xdb11, 0x0, 0x6, 0x4, 0xfffffffffffffffd, 0x7ea7, 0xf68c, 0x10000, 0xffffffffffffffe0, 0x0, 0xf0, 0x9, 0x5, 0x1, 0x0, 0x20, 0x62, 0xad, 0x6b, 0x5, 0x8, 0xc491, 0xfffffffffffffff7, 0xdb6, 0xce92, 0x10000, 0x2, 0x3, 0xbb69, 0x1, 0x4, 0x11, 0x6, 0x401, 0xebbc, 0x5, 0x9, 0xffffffffffff687b, 0x7fffffff, 0xff, 0x0, 0x0, 0x7f, 0x8, 0xfffffffffffffff7, 0x10000, 0x80, 0x3, 0x80000001, 0x81, 0x7, 0x8, 0x5, 0xfffffffffffffffe, 0x8, 0x2, 0x1, 0x1, 0xffffffffffff7fff, 0x101, 0x10000, 0x6, 0x7, 0x2, 0xd1e, 0xd, 0x1, 0xffffffffffffff7f, 0x6, 0xfffffffffffffff8, 0x1, 0xa30, 0x8, 0x3, 0x6, 0x0, 0x1, 0x585, 0x3ff, 0x9, 0x8, 0x9, 0x0, 0x9, 0x3, 0x0, 0xfffffffffffffff7, 0x5, 0x2, 0x1f, 0x242af249, 0x39, 0x6, 0xc7, 0x101, 0x6, 0x0, 0x8, 0xa49f, 0x1, 0xfffffffffffffffe, 0x6b, 0x140000, 0xffffffff, 0x2, 0x5, 0x6731, 0x5, 0x10001, 0xffffffffffffff34, 0x0, 0x2, 0x0, 0x7fffffff, 0x9, 0x80000000, 0xffffffffffff4d53, 0x1, 0xff, 0x3940, 0x401, 0x88, 0x5c, 0x4, 0x8, 0x6, 0x8000, 0x4, 0xf76a, 0xcd29, 0xfffffffeffffffff, 0xffffffff, 0x1b7, 0xfffffffffffffffd, 0x6, 0xe8, 0x7, 0x0, 0xe6, 0x2, 0x0, 0x4, 0x3, 0x7c7, 0x0, 0x3ff, 0x8, 0xd, 0x7, 0x3, 0xffffffff, 0xffffffffffffff0d, 0x4, 0x401, 0x8, 0x1800000000000000, 0xfe, 0x1, 0x7e7b8d6, 0x3, 0x9, 0x9, 0xfffffffffffffffb, 0x6, 0xb283, 0x4, 0x401, 0xffff, 0x2, 0xa5, 0x415, 0xc0, 0x9, 0xf1, 0x0, 0x9d4d, 0xda, 0x8, 0x1, 0x8001, 0x1, 0x0, 0x30, 0x46, 0x8, 0x401, 0x7, 0x6, 0xfffffffffffffff7, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0x6, 0x20, 0x9, 0x57f5, 0x57e, 0x7, 0x400, 0x1, 0x7fffffff, 0x3, 0x1, 0x7, 0xcd15, 0x81, 0x0, 0x5, 0x7fffffff, 0x7, 0x81, 0x3, 0xcb, 0x9, 0x7fffffff, 0x7ff, 0xffffffffffffffc0, 0x4, 0x36, 0x3ff, 0xfffffffffffffffb, 0x1000, 0x2, 0x4, 0x738c0000000000, 0x8, 0x0, 0x4d49, 0xc0000, 0x40, 0x80000001, 0x3, 0x1000, 0x6747, 0x7, 0x8, 0x197, 0xffff]}, @TCA_CBQ_WRROPT={0x10, 0x2, {0xfc, 0x3, 0x57, 0x9, 0xbe8, 0x8}}, @TCA_CBQ_RATE={0x10, 0x5, {0x1, 0x1, 0x8, 0xfffffffffffffc01, 0x9aca}}, @TCA_CBQ_RATE={0x10, 0x5, {0x101, 0x2, 0x1, 0x5, 0x10000, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x3a, 0x1, 0x1e, 0x4, 0x100000000, 0xffff, 0x23d, 0x1}}]}}]}, 0x8b8}, 0x1, 0x0, 0x0, 0xc1}, 0x4000810) write$binfmt_aout(r1, &(0x7f0000000b00)=ANY=[@ANYBLOB="0001000000000000ff00001d09fffffe"], 0x10) 13:41:16 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0xfffffffffffff3d8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x5, 0x3de, 0x7}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0x8009f, 0xf17, 0x9}, &(0x7f00000000c0)=0x17f) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={r4, 0xb8, &(0x7f0000000100)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @rand_addr=0x6}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0xc}}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e24, @rand_addr=0xa65c}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x4}]}, &(0x7f0000000200)=0x10) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000ac0)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaefb466ef25a36fd991b185512c2700000000000100000000660630c202516e63da9b9d56c792834c8f8054d5847039050000000000002000efcea8b7cea284f01703734ba97e7f81624642c732a9c2fffb00f77691567fac148930d631ae2309059736e37d008103cef01f373cf2c5cef73303808371f9f30f2ade9ec1a942656685824973883cf1b1dcb7f1025dc5a3548de53d077f0a7d97b71ac21c"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0xffffffffffffffb5) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:16 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x8000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0xffffffffffffff41}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r3 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) [ 351.474403] __kmalloc_node_track_caller+0x23f/0x1160 [ 351.479643] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 351.485060] ? netlink_ack+0x568/0x1140 [ 351.489090] ? netlink_ack+0x568/0x1140 [ 351.493143] __alloc_skb+0x2f5/0x9e0 [ 351.496938] ? netlink_ack+0x568/0x1140 [ 351.501007] netlink_ack+0x568/0x1140 [ 351.504884] ? kmsan_set_origin_inline+0x6b/0x120 [ 351.509819] netlink_rcv_skb+0x302/0x5f0 [ 351.513928] ? rtnetlink_bind+0x120/0x120 [ 351.518117] rtnetlink_rcv+0x50/0x60 [ 351.521873] netlink_unicast+0x1638/0x1720 [ 351.526163] ? rtnetlink_net_exit+0x90/0x90 [ 351.530596] netlink_sendmsg+0x1205/0x1290 [ 351.534940] ___sys_sendmsg+0xe70/0x1290 [ 351.539103] ? kstrtoull+0x6e1/0x790 [ 351.542877] ? netlink_getsockopt+0x11c0/0x11c0 [ 351.547626] ? kmsan_set_origin_inline+0x6b/0x120 [ 351.552540] ? __msan_poison_alloca+0x173/0x1f0 [ 351.557293] ? rcu_all_qs+0x2e/0x1f0 [ 351.561086] ? _cond_resched+0x38/0xc0 [ 351.565051] ? rcu_all_qs+0x2e/0x1f0 [ 351.568854] ? __sys_sendmmsg+0x6c6/0x930 [ 351.573100] __sys_sendmmsg+0x4ac/0x930 [ 351.577157] ? prepare_exit_to_usermode+0x46/0x410 [ 351.582161] ? syscall_return_slowpath+0xdb/0x700 [ 351.587119] __se_sys_sendmmsg+0xbd/0xe0 [ 351.591234] __x64_sys_sendmmsg+0x56/0x70 [ 351.595440] do_syscall_64+0xb8/0x100 [ 351.599295] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 351.604517] RIP: 0033:0x457099 [ 351.607754] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:41:16 executing program 0: prlimit64(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) [ 351.626698] RSP: 002b:00007efd28985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 351.634456] RAX: ffffffffffffffda RBX: 00007efd289866d4 RCX: 0000000000457099 [ 351.641759] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 351.649079] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 351.656392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 351.663697] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000005 13:41:17 executing program 3 (fault-call:4 fault-nth:6): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:17 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x9, 0x2, 0x2}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e21, 0x40, @empty, 0x7}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0xffffffffffffff92}, 0x6, [0x10, 0x80000000, 0x9, 0x9, 0x8001, 0x0, 0x0, 0x101]}, 0x5c) r1 = socket$inet6(0xa, 0x1, 0xfffffffffffffffb) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) setsockopt$inet6_buf(r0, 0x29, 0x3f, &(0x7f0000000100)="406f1fa46e26e068e6cb543c327020b9b66e6eeb9329edd434d40fd26788c75ce2eba5e8421314ce7827c772fe9bfb2d934153a4199a37adfdaae135ae7e6d8c3207d1d28c7fda0afd793a885cefe530f334ee08062c6f9c1e33082e85c1d4b6ce320543450c8df54863ad6877d100beeb6b9e1699b3c43f8df1454435d5da3b77ea4c3715733a90ddfa0f7730f8682ee9338bd2c5c5bff32a66523a2c2a2afbf13e95a4fb87ad6beebcdfb45ef8c396ee6fcf8fd1b0c2276e1a6a4d1b8f2cf006a8", 0xc2) 13:41:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000a80)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x800, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f19512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea2ca84f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00000000000000000000000000000000"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r6 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r6, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) getsockopt$inet_dccp_int(r6, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r8}}, 0x18) ioctl$SG_EMULATED_HOST(r7, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x6, 0x1008, 0x3}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000001440)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001480)={r0, &(0x7f0000000040), &(0x7f00000024c0)=""/4096}, 0x18) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x703240) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000180)=""/245) 13:41:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="303546bf3c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0xfffffffffffffd86, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:17 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:17 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, r2, 0x404, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x10) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) [ 352.184481] FAULT_INJECTION: forcing a failure. [ 352.184481] name failslab, interval 1, probability 0, space 0, times 0 [ 352.195940] CPU: 1 PID: 15398 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 352.203247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.212841] Call Trace: [ 352.215482] dump_stack+0x14b/0x190 [ 352.219186] should_fail+0xa98/0xaa0 [ 352.222960] __should_failslab+0x278/0x2a0 [ 352.227262] should_failslab+0x29/0x70 [ 352.231214] kmem_cache_alloc_node+0x156/0xc00 [ 352.235851] ? __alloc_skb+0x201/0x9e0 [ 352.239829] __alloc_skb+0x201/0x9e0 [ 352.243599] ? __msan_get_context_state+0x9/0x30 [ 352.248448] netlink_sendmsg+0xb49/0x1290 [ 352.252701] ___sys_sendmsg+0xe70/0x1290 [ 352.256838] ? kstrtoull+0x6e1/0x790 [ 352.260612] ? netlink_getsockopt+0x11c0/0x11c0 [ 352.265363] ? kmsan_set_origin_inline+0x6b/0x120 [ 352.270285] ? __msan_poison_alloca+0x173/0x1f0 [ 352.275030] ? rcu_all_qs+0x2e/0x1f0 [ 352.278823] ? _cond_resched+0x38/0xc0 13:41:17 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000040a07041dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 352.282780] ? rcu_all_qs+0x2e/0x1f0 [ 352.286575] ? __sys_sendmmsg+0x6c6/0x930 [ 352.290815] __sys_sendmmsg+0x4ac/0x930 [ 352.294872] ? prepare_exit_to_usermode+0x46/0x410 [ 352.299878] ? syscall_return_slowpath+0xdb/0x700 [ 352.304835] __se_sys_sendmmsg+0xbd/0xe0 [ 352.308952] __x64_sys_sendmmsg+0x56/0x70 [ 352.313146] do_syscall_64+0xb8/0x100 [ 352.317002] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.322238] RIP: 0033:0x457099 [ 352.325486] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.344429] RSP: 002b:00007efd28985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 352.352193] RAX: ffffffffffffffda RBX: 00007efd289866d4 RCX: 0000000000457099 [ 352.359503] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 352.366807] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 352.374114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 352.381417] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000006 13:41:17 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x115e, 0x200000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x80, r1, 0x110, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc25}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x135}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x95d}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x840}, 0x59ce77808d3f4ecb) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) readv(r4, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0x3c7}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000001340)=""/217, 0xfffffd27}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x1000000000000193) tee(r4, r3, 0x400000000008, 0x0) tee(r2, r5, 0x6, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r3) connect$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0x5, 0x8, 0x4, 0xffffffff, 0x9, 0x6}, 0x5f}, 0xa) 13:41:17 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000004c0)={&(0x7f0000000400)=""/144, 0x0, 0x1800, 0x4}, 0x18) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x2}, [{0x2, 0x1, r3}], {0x4, 0x2}, [{0x8, 0x2, r4}, {0x8, 0x2, r5}, {0x8, 0x2, r6}, {0x8, 0x2, r7}], {0x10, 0x6}, {0x20, 0x7}}, 0x4c, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) 13:41:17 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) dup2(r0, r1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) 13:41:17 executing program 3 (fault-call:4 fault-nth:7): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:17 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) 13:41:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x3}], 0x1c) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1f, 0x400201) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0xc0080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x20003, &(0x7f0000000b00)={0xffffffffffffffff}, 0x13b, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xb9d}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x38}, r4, 0x7f}}, 0x48) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="30353c55a422df9f4f8600af8f1968830a7ddaef63271637a36fd991b185512c2700000000000100000000660630c202516e63da9b9d568792834c8f8054d584703905000000000000000eefcea8b7cea284f0f6036d4642c732a9c2fffb00f77691567fac148932520fd6157dd631ae2309059736e37d00"]) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000540)=0x3) r7 = memfd_create(&(0x7f0000000080)=']-\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) openat(r7, &(0x7f0000000280)='./file0\x00', 0x101000, 0x80) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) getsockopt$inet_dccp_int(r7, 0x21, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000600)="ed1777f5182ed5a93de5bde5aa9699ef5730199643ac021cbbac16b08f0a449df30cc317c4f65900225828ed1231cc7cbf4c71db2cf79c0e7c9d37ebd0db7c313634f9342548364c555961b882beb2600d3a5dbd8c9dbe11ab62b829a3089e875088ab7df2f9ac531f3c185cdc6e1c9d317873851a7247bcddb424492ffafdafc1fe9593957c5663a14a5ec9bb14e5767809ade6bbf512577b1dfd610acd7c9ed99e733d0475c13a217acccd30688c5c79f7861e") write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000800), r9}}, 0x18) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xffffff20) getuid() 13:41:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_setup(0x20000000000c02c, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) sendto(r0, &(0x7f0000000000)="0955c189bf8a61aa72f9692161db63b11dc84fec89383bcba5e6308ac9cca803593951c6a0e3fa87e6a08c68ff662690635f4341d11a40739d40bef333565498090558a61ec4c89348552586486c8272", 0x50, 0x4, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x1, 0x3, {0xa, 0x4e20, 0x4, @remote, 0x800000}}}, 0x80) r2 = request_key(&(0x7f0000000740)='ceph\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000007c0)='logon\x00', 0xfffffffffffffffc) r3 = add_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000006c0)="786c1d0c9e4df7825d3005566a8372c3cb06d6f379fae32105f0bbd79702ad203b67eb92e8f923a9597b1a749d73ee8ef2526b1cd02f9a3768a457b3d1a7ec22f28404d15feb1bec2684a5ca19bf5c567fb12f96cc13416eb616fe054ee36b779679561654687a64", 0x68, r2) r4 = request_key(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000300)='\x00', 0xfffffffffffffffb) r5 = accept4(r0, &(0x7f0000000340)=@l2, &(0x7f00000003c0)=0x80, 0x80000) r6 = getuid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000440)=0x0) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x9f, 0x100000000, 0x20, 0xc19, 0x23, 0x8001, {0x0, @in={{0x2, 0x4e21, @rand_addr=0x7ff}}, 0x20, 0xffffffffffff0001, 0x8, 0x5, 0x6}}, &(0x7f00000005c0)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000600)=@assoc_value={r8, 0x5}, &(0x7f0000000680)=0x8) sendmsg$nl_generic(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)={0x1320, 0x36, 0x400, 0x70bd2b, 0x25dfdbfd, {0x1d}, [@generic="70995f952562528ef94d9d8c2fec7d1e25ded87237faa2f38aaef481bd1ae240b8437b7223ff32691ed6d512eb5a5f7f6a7cb8d900cabb9a94780eb043201607ba19e27cd79b3eecd5ead0f2ce7f533a75e30792a11b711da00c47a2be025fd3b1ed1d9d01a3e34c2e8e393c1e11cebc5fabfff5344fd9266611de5899e6a388509401be3e84f96fc15016376fdc", @typed={0x4, 0x4c}, @generic="8efe1687d38646a495c3445d41c4e2a4d5207fd6f2a2f8c78f6ca8e6645dfa376ed585862491876053ae040b9588e26a6846fc73075841f78fcff433e6bbc284bab14bfd544f29b5920a3f6269d00590f5377dea361cca44fcc961c93eb3336285cc95c1", @typed={0x4, 0x56}, @nested={0x14c, 0x4, [@typed={0x8, 0x34, @uid=r6}, @generic="8d8561915018404c3e7047d482eec5a2ad353b6b617e3906be58229a37947eeb884fc2ce4d0a7015489ecd46448d74e7c467c8356bc94b2baa2c2933e5ac8183fd4164a24231104bc49aab", @typed={0x8, 0x8, @pid=r7}, @generic="404fd95641311aaa293ca91f6800b55ed2c026f3ce026794cf54d6fdcc962ccc3255ca587b7269971ac816bd2de0ce5505b74cea3410aede8e71f6c9d0d590b1c5ecd9ee9ef6998ca810fa6b05c877ebc912dc71e17b48173443452591e9666f00abaf11e5088128cd51b69375e0a19e6e6952956a7b08dc92bb87450d6b79ae570733e8da949140d74e104bdbb5", @typed={0x8, 0x6b, @ipv4=@remote}, @generic="5df09847a1224d4b60549c799b6458404fa1e24832b48fec11af73b6e85a24eaecab98e29f07e7400eeb64d2ef6b32b522ef85e7e4e830a0986962e52bfd33c2ac99c69dd9ff2f0ebdd6da9eade74ec8ec3ac678b488"]}, @generic="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", @generic="ec7448b15b0d670da316de41d8d75894587dfdc759afea788dc19df93a9b7ee532c4cbdcb55f597e209fc1e4bbc0e52709eaeb7eb86c4b76a15b8493cb3eb694eaa1647559a066aaa91f23707a3fdfa2b5b2fac5c7afadf0be8250b185e8bd7314ae43a35eb266c43df06dd861004d256331614a34ed1760bee382fbc33bf2e05100c0b9b5a8cc104677ebcb99610a5acec5b2037c8cce3e8959a5b56ef8e78e9f4d455c6781d66324e8702a77e4a53bae69f6ad77c253499726050b2a540097d5f4853642"]}, 0x1320}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) keyctl$instantiate(0xc, r3, &(0x7f0000000240)="061fa47450f2aa2da3ea46fa631390b857723a4676310c109b0d7832d5aa345f3e9895", 0x23, r4) [ 352.806152] FAULT_INJECTION: forcing a failure. [ 352.806152] name failslab, interval 1, probability 0, space 0, times 0 [ 352.817588] CPU: 1 PID: 15423 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #41 [ 352.824910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.834309] Call Trace: [ 352.836970] dump_stack+0x14b/0x190 [ 352.840674] should_fail+0xa98/0xaa0 [ 352.844471] __should_failslab+0x278/0x2a0 [ 352.848786] should_failslab+0x29/0x70 [ 352.852736] __kmalloc_node_track_caller+0x23f/0x1160 [ 352.857975] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 352.863389] ? netlink_sendmsg+0xb49/0x1290 [ 352.867804] ? netlink_sendmsg+0xb49/0x1290 [ 352.872211] __alloc_skb+0x2f5/0x9e0 [ 352.875977] ? netlink_sendmsg+0xb49/0x1290 [ 352.880395] netlink_sendmsg+0xb49/0x1290 [ 352.884688] ___sys_sendmsg+0xe70/0x1290 [ 352.888837] ? kstrtoull+0x6e1/0x790 [ 352.892613] ? netlink_getsockopt+0x11c0/0x11c0 [ 352.897360] ? kmsan_set_origin_inline+0x6b/0x120 [ 352.902284] ? __msan_poison_alloca+0x173/0x1f0 [ 352.907036] ? rcu_all_qs+0x2e/0x1f0 [ 352.910831] ? _cond_resched+0x38/0xc0 [ 352.914796] ? rcu_all_qs+0x2e/0x1f0 [ 352.918601] ? __sys_sendmmsg+0x6c6/0x930 [ 352.922842] __sys_sendmmsg+0x4ac/0x930 [ 352.926902] ? prepare_exit_to_usermode+0x46/0x410 [ 352.931927] ? syscall_return_slowpath+0xdb/0x700 [ 352.936883] __se_sys_sendmmsg+0xbd/0xe0 [ 352.941002] __x64_sys_sendmmsg+0x56/0x70 [ 352.945201] do_syscall_64+0xb8/0x100 [ 352.949057] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.954283] RIP: 0033:0x457099 [ 352.957525] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.976469] RSP: 002b:00007efd28985c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 352.984252] RAX: ffffffffffffffda RBX: 00007efd289866d4 RCX: 0000000000457099 [ 352.991562] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000004 [ 352.998879] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 13:41:18 executing program 0: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) [ 353.006180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 353.013503] R13: 00000000004d47b8 R14: 00000000004c8d70 R15: 0000000000000007 13:41:18 executing program 4: prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x13d8}, 0x8, 0x80800) [ 353.070597] raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! [ 353.112883] kthreadd: page allocation failure: order:4, mode:0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 353.123768] kthreadd cpuset=/ mems_allowed=0 [ 353.128363] CPU: 1 PID: 2 Comm: kthreadd Not tainted 4.19.0-rc1+ #41 [ 353.134904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.144299] Call Trace: [ 353.146944] dump_stack+0x14b/0x190 [ 353.150617] warn_alloc+0x472/0x690 [ 353.154329] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 353.159260] ? __msan_poison_alloca+0x173/0x1f0 [ 353.164001] ? memcg_kmem_get_cache+0x64/0x1010 [ 353.168780] copy_process+0xb05/0xa950 [ 353.172720] ? kmsan_set_origin_inline+0x6b/0x120 [ 353.177623] ? kthread_blkcg+0xf0/0xf0 [ 353.181560] ? __msan_poison_alloca+0x173/0x1f0 [ 353.186287] _do_fork+0x339/0xfb0 [ 353.189802] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.195227] ? balance_callback+0x48/0x260 [ 353.199528] ? kthread_blkcg+0xf0/0xf0 [ 353.203472] kernel_thread+0xc6/0xe0 [ 353.207241] ? kthread_blkcg+0xf0/0xf0 [ 353.211189] kthreadd+0x59c/0x900 [ 353.214687] ? kthread_stop+0x670/0x670 [ 353.218708] ret_from_fork+0x35/0x40 [ 353.222791] warn_alloc_show_mem: 1 callbacks suppressed [ 353.222813] Mem-Info: [ 353.230783] active_anon:323237 inactive_anon:108 isolated_anon:0 [ 353.230783] active_file:5632 inactive_file:7142 isolated_file:96 [ 353.230783] unevictable:0 dirty:145 writeback:0 unstable:0 [ 353.230783] slab_reclaimable:3699 slab_unreclaimable:15670 [ 353.230783] mapped:71429 shmem:118 pagetables:12044 bounce:0 13:41:18 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) rt_sigqueueinfo(r1, 0x15, &(0x7f0000000080)={0xe, 0x8, 0x8000, 0x8}) r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10000000000038, &(0x7f0000534000), &(0x7f0000000040)=0x4) [ 353.230783] free:32314 free_pcp:403 free_cma:0 [ 353.264621] Node 0 active_anon:1292948kB inactive_anon:432kB active_file:22528kB inactive_file:26636kB unevictable:0kB isolated(anon):0kB isolated(file):512kB mapped:285716kB dirty:580kB writeback:0kB shmem:472kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 1204224kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 353.293182] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 353.319509] lowmem_reserve[]: 0 2833 7259 7259 [ 353.324242] Node 0 DMA32 free:64348kB min:26324kB low:32904kB high:39484kB active_anon:793100kB inactive_anon:12kB active_file:160kB inactive_file:848kB unevictable:0kB writepending:220kB present:3129292kB managed:2906052kB mlocked:0kB kernel_stack:36992kB pagetables:30892kB bounce:0kB free_pcp:240kB local_pcp:0kB free_cma:0kB [ 353.353542] lowmem_reserve[]: 0 0 4425 4425 [ 353.357988] Node 0 Normal free:57960kB min:41112kB low:51388kB high:61664kB active_anon:497804kB inactive_anon:420kB active_file:22260kB inactive_file:24840kB unevictable:0kB writepending:360kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:20288kB pagetables:17284kB bounce:0kB free_pcp:1660kB local_pcp:180kB free_cma:0kB [ 353.388025] lowmem_reserve[]: 0 0 0 0 [ 353.391968] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB 13:41:18 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x3f) r2 = dup2(r0, r1) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x9c}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r3, 0x7}, 0x8) [ 353.405500] Node 0 DMA32: 183*4kB (UME) 56*8kB (UME) 10*16kB (UME) 1*32kB (M) 12*64kB (UME) 5*128kB (U) 2*256kB (ME) 1*512kB (U) 1*1024kB (E) 7*2048kB (UMEH) 11*4096kB (MH) = 64220kB [ 353.422311] Node 0 Normal: 822*4kB (MEH) 1434*8kB (UMEH) 818*16kB (UMEH) 413*32kB (UME) 211*64kB (ME) 17*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 56744kB [ 353.437843] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 353.446507] 11651 total pagecache pages [ 353.450608] 0 pages in swap cache [ 353.454159] Swap cache stats: add 0, delete 0, find 0/0 [ 353.459623] Free swap = 0kB [ 353.462705] Total swap = 0kB [ 353.465814] 1965969 pages RAM [ 353.468971] 0 pages HighMem/MovableOnly [ 353.473006] 102442 pages reserved [ 353.484278] BUG: unable to handle kernel NULL pointer dereference at 00000000000008f4 [ 353.492304] PGD 800000000e489067 P4D 800000000e489067 PUD e4b2067 PMD 0 [ 353.499207] Oops: 0002 [#1] SMP PTI [ 353.502868] CPU: 1 PID: 15440 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #41 [ 353.510155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.519552] RIP: 0010:memset_erms+0x9/0x10 [ 353.523819] Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 [ 353.542761] RSP: 0018:ffff88001adcf268 EFLAGS: 00010046 [ 353.548159] RAX: 0000000000000000 RBX: fffffffffffffff4 RCX: 0000000000000fb0 [ 353.555453] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008f4 [ 353.562761] RBP: ffff88001adcf278 R08: 0000000000000000 R09: 00000000000008f4 [ 353.570067] R10: 0000000000000000 R11: ffffffff818a7e40 R12: 000000009b4000d9 [ 353.577368] R13: 0000000000000000 R14: 0000000000000286 R15: fffffffffffffff4 [ 353.584677] FS: 00007fe630115700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 353.592950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.598874] CR2: 00000000000008f4 CR3: 000000000faf6000 CR4: 00000000001406e0 [ 353.606164] Call Trace: [ 353.608797] ? do_kmsan_thread_create+0x1b/0x30 13:41:18 executing program 3 (fault-call:4 fault-nth:8): r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 353.613507] kmsan_thread_create+0x4b/0x90 [ 353.617796] __kthread_create_on_node+0x71b/0x810 [ 353.622703] ? kthread_create_on_node+0xf5/0x270 [ 353.627500] ? init_rescuer+0x334/0x6f0 [ 353.631521] kthread_create_on_node+0x23f/0x270 [ 353.636237] ? rcu_free_pwq+0x70/0x70 [ 353.640096] init_rescuer+0x334/0x6f0 [ 353.643950] __alloc_workqueue_key+0x1d90/0x2300 [ 353.648790] ? __kmalloc+0x13a/0x350 [ 353.652540] ? ucma_open+0x69/0x4f0 [ 353.656200] ucma_open+0x122/0x4f0 [ 353.659778] ? module_put+0x52/0x350 [ 353.663541] ? ucma_poll+0x240/0x240 [ 353.667287] misc_open+0x6e2/0x8b0 [ 353.670885] ? misc_seq_show+0x180/0x180 [ 353.674981] chrdev_open+0xc26/0xdb0 [ 353.678735] ? cd_forget+0x310/0x310 [ 353.682497] do_dentry_open+0xce6/0x1740 [ 353.686592] ? kmsan_memcpy_origins+0x111/0x1b0 [ 353.691312] vfs_open+0xaf/0xe0 [ 353.694626] path_openat+0x1799/0x6870 [ 353.698934] ? __msan_poison_alloca+0x173/0x1f0 [ 353.703670] ? do_sys_open+0x630/0x940 [ 353.707597] do_filp_open+0x259/0x610 [ 353.710842] kworker/u4:6: page allocation failure: order:4, mode:0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 353.711506] do_sys_open+0x630/0x940 [ 353.722714] kworker/u4:6 cpuset= [ 353.726336] __se_sys_openat+0xcb/0xe0 [ 353.726365] __x64_sys_openat+0x56/0x70 [ 353.726384] do_syscall_64+0xb8/0x100 [ 353.726434] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 353.726462] RIP: 0033:0x457099 [ 353.729889] / [ 353.733748] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.737872] mems_allowed=0 [ 353.741522] RSP: 002b:00007fe630114c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 353.741545] RAX: ffffffffffffffda RBX: 00007fe6301156d4 RCX: 0000000000457099 [ 353.741557] RDX: 0000000000000002 RSI: 0000000020000380 RDI: ffffffffffffff9c [ 353.741569] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 353.741594] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 353.746847] CPU: 0 PID: 9818 Comm: kworker/u4:6 Not tainted 4.19.0-rc1+ #41 [ 353.749961] R13: 00000000004d3948 R14: 00000000004c8588 R15: 0000000000000000 [ 353.749999] Modules linked in: [ 353.751711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.770616] Dumping ftrace buffer: [ 353.773587] Workqueue: events_unbound call_usermodehelper_exec_work [ 353.781266] (ftrace buffer empty) [ 353.795812] CR2: 00000000000008f4 [ 353.803069] Call Trace: [ 353.803105] dump_stack+0x14b/0x190 [ 353.803125] warn_alloc+0x472/0x690 [ 353.803172] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 353.803213] ? __msan_poison_alloca+0x173/0x1f0 [ 353.803254] ? memcg_kmem_get_cache+0x64/0x1010 [ 353.803320] copy_process+0xb05/0xa950 [ 353.810563] ---[ end trace 8643a8036e4f68b4 ]--- [ 353.817713] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.824967] RIP: 0010:memset_erms+0x9/0x10 [ 353.828169] ? check_preempt_wakeup+0x59/0x15d0 [ 353.837516] Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 [ 353.841086] ? proc_cap_handler+0x680/0x680 [ 353.847467] RSP: 0018:ffff88001adcf268 EFLAGS: 00010046 [ 353.851211] ? kmsan_write_aligned_origin_inline+0x41/0x60 [ 353.857245] ? __msan_poison_alloca+0xc0/0x1f0 [ 353.860860] RAX: 0000000000000000 RBX: fffffffffffffff4 RCX: 0000000000000fb0 [ 353.864505] _do_fork+0x339/0xfb0 [ 353.869337] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008f4 [ 353.874023] ? proc_cap_handler+0x680/0x680 [ 353.878662] RBP: ffff88001adcf278 R08: 0000000000000000 R09: 00000000000008f4 [ 353.882609] kernel_thread+0xc6/0xe0 [ 353.887287] R10: 0000000000000000 R11: ffffffff818a7e40 R12: 000000009b4000d9 [ 353.887312] R13: 0000000000000000 R14: 0000000000000286 R15: fffffffffffffff4 [ 353.892694] ? proc_cap_handler+0x680/0x680 [ 353.896905] FS: 00007fe630115700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 353.901599] call_usermodehelper_exec_work+0x142/0x500 [ 353.920475] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.920505] CR2: 00000000000008f4 CR3: 000000000faf6000 CR4: 00000000001406e0 [ 353.924869] ? call_usermodehelper_setup+0x4c0/0x4c0 [ 353.930197] Kernel panic - not syncing: Fatal exception [ 353.935866] process_one_work+0x1605/0x1f40 [ 354.034063] worker_thread+0x11a2/0x2590 [ 354.038170] kthread+0x465/0x4a0 [ 354.041557] ? process_one_work+0x1f40/0x1f40 [ 354.046084] ? kthread_blkcg+0xf0/0xf0 [ 354.049998] ret_from_fork+0x35/0x40 [ 354.054013] Dumping ftrace buffer: [ 354.057560] (ftrace buffer empty) [ 354.061259] Kernel Offset: disabled [ 354.064878] Rebooting in 86400 seconds..