f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r0) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003a0008000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0xfdffffff00000000, 0x0, 0x0) 03:40:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_setparam(r1, &(0x7f0000000040)=0xfffffffffffffe01) [ 2855.701576] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2855.736716] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000001000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2855.920030] input: syz1 as /devices/virtual/input/input4665 03:40:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x3}, 0x8) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="2b20b2f3a4830489a07c1b6084edc0f8036fcdf425df0d90dc9c16a96ec991f1ee4b9175bf27b817f488994b21969791538de828a54ec34b55a3323a60d44f0ae8cf882e4548b99b7a7b503b6b454a94dc993262a61c1be93786d6c4349fc03279bee4d3abe9ed7aeb55e52ec10e064767b44fc8c0bbac08b181a18340854501422fa6e8360ff112f7f6326ab60bcc75c84388663b2f3fbf0d41db77ecae935b", 0xa0, 0xfffffffffffffff9) r4 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="8437e8e9715d688856f03d3a6ba0f7edf4e8b67e7b9867a87aa3146105f0b618eb0d168b02906be6a66ee9804452602cd4e9ec3c2939f3edf7479f634b825f74c7f563c0cf12ac63914a1a2159ab09bec82b33b16812b4e7e17256fadd08d6", 0x5f, 0xffffffffffffffff) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000680)=0xd0) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)=']GPL[lo-\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f00000004c0)={r3, r4, r5}, &(0x7f0000000500)=""/204, 0xcc, &(0x7f0000000640)={&(0x7f0000000600)={'sha512-avx2\x00'}}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x9}, &(0x7f0000000180)=0x8) 03:40:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0xfeffffff00000000, 0x0, 0x0) [ 2855.984027] input: syz0 as /devices/virtual/input/input4666 03:40:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r2) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xa) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xd) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2856.061683] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2856.098825] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:50 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0='bpq0\x00', 0x40cf, 'syz1\x00', @null, 0xe50, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = socket$inet(0x2, 0x4000000000000003, 0x6) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'ip6tnl0\x00', 0x80000000}) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0xf) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='schedstat\x00') ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000040)={0x6000, 0x11000, 0x1, 0x4, 0xbc}) ppoll(&(0x7f0000000080)=[{r2, 0x20}, {r1}, {r1}], 0x3, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180)={0x1}, 0x8) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0xffffffff00000000, 0x0, 0x0) 03:40:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000002000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2856.255645] input: syz1 as /devices/virtual/input/input4667 [ 2856.272402] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2856.298573] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r1, &(0x7f0000002600)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x0, 0x200007fe, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000001540)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000001580)=0x8, 0x4) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/full\x00', 0x10000, 0x0) recvmsg$kcm(r3, &(0x7f0000001500)={&(0x7f0000001340)=@rc, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000013c0)=""/136, 0x88}, {&(0x7f0000001480)=""/127, 0x7f}, {&(0x7f0000000bc0)=""/3, 0x3}], 0x3, &(0x7f0000001600)=""/4096, 0x1000}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r4 = dup2(r1, r0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49bd91b7312884faf6a1c00708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r5, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000000)={0x3, &(0x7f0000001180)=[{}, {}, {}]}) r6 = dup(r5) ioctl$UI_SET_SWBIT(r6, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r5, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656339fa000000000000746831e9b457cd7e4b79853c058a"]) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r7, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2856.587517] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2856.656071] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2856.667611] input: syz1 as /devices/virtual/input/input4669 03:40:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) getpeername(r1, &(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000000)=0x80) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000b80)=0x40, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4030000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xffffffffffffffe4, r1, 0x225, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", ""]}, 0xfffffffffffffead}, 0x1, 0x0, 0x0, 0x40000}, 0xc0) prctl$PR_GET_NO_NEW_PRIVS(0x27) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000004000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2856.697183] input: syz1 as /devices/virtual/input/input4670 03:40:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:51 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40, 0x0) ioctl$KDENABIO(r0, 0x4b36) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000180)=0x10, 0x800) 03:40:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7365637572bd13bfa47dff437d3100000000ffffffffffef00"]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2856.911671] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2856.963381] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2857.008744] input: syz1 as /devices/virtual/input/input4671 [ 2857.046247] input: syz1 as /devices/virtual/input/input4672 03:40:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0xffffffffa0008000, 0x0, 0x0) 03:40:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000005000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000000740)={&(0x7f0000000080), 0xc, &(0x7f0000000700)={&(0x7f0000000240)={0x4b4, 0xd, 0x7, 0x419, 0x70bd2c, 0x25dfdbfc, {0xf, 0x0, 0x2}, [@generic="b6ff28efcfa30509bafa4f3c5ca041400975482b333fd54c8db8c7659dcab741389e18b31c0e68a459fe9ee1b9f369275623f23b4ae69e5858f1e3ca222ac81ae3993fcdc1e36e8f2fbbb6096158c8c1ffd44e4391f670a7ccc35a122650bf576f36844260a521063f922357e2df17136ce974f5dd4ea749e4a4f0801c42ecff62efaa702ee7", @generic="209f710fd4165de1e5", @generic="dc5ab6cbbfb628cfacbad03cbfdc829a0534b19cd970abf7fd1c8c634eead64e9b1db251170a96502fdca56f32832db3", @typed={0x14, 0x10, @ipv6=@ipv4={[], [], @empty}}, @nested={0x1a4, 0x12, [@typed={0x8, 0x89, @fd=r0}, @generic="5c4b1dd4174ec753a9f0dc35ded4185f9676bfe44f24c3f078c1258200359fe97b84ded0e9a3719fa98b221bdb8a751ad4f0b7ce53b98ef25fac33694d42bab3b723d49ede550f88b02d87f37faecf7c6c3e68c49cbe32742a81fca877079a9bbb7045bd4be00b62cd6eef8a5d41309529a95bf4f46f06a8bf40a373ccf806e83e1dbd78d66304bd46b457c926427858692783f4a0cec2086d62bb48f0b8", @generic="bc7c9c4883496fbc63170581902e0537152e06a650f630d956a75425d5b0d9b19c2db254b7e99f57c0b4a7e9d4a474947c874822674054cf9db582403ca0966ff2f4b706a01a790f15113e27bc4bd07f1c5b8477026a059179568cbbe31d78d74e2a08d9b2abc047e545655123abbb17fd745f22492e775c5fb6", @generic="cfafcb2576d9ba027e9470145987e7d15e08e7caf6f187e2c3c59b08d636da6909bd8485b40d18b1a1db82e3689aacc65d096428f47edf603c2747e62fc3bef514baea6f3ff4862047c0c891cc29380d3e6b2fff937a4402e034", @generic="f494173b80d185499c35fde54ed4f37f78c0", @typed={0x8, 0x6f, @uid=r2}, @typed={0x4, 0x23}, @typed={0x8, 0x82, @u32=0x1}]}, @generic="c8a52444736b4d17fbf1980aecd8edec09c4ee6de2b865d5ad2867c8cb775b9f5b8e51b54aaceb5dcb24e190178b34e1b76990c5ea3efcca7931ddea428ef172e259e7562fc156b14286a2d3a1a7fae4d816718742e2eb7917edfc1b670ffb91eb8698194eabfbd3a3ce72d9461c54527e2a3401c123fe64c1cd2a8573aeb9d571285bddc6a1c4621df323156bc64363489bbbd2312a97e3638965b95482fd0bcda6b4e518231c0d98d654ab30a9548e194911bf82ed13cc5ed7f6b9f00ed07c1db6a28abf75b9ee7f09320f7189549d56c4f045fa085cccbb7a0d69f1227ac6cac997b24bf756426e3cfcad55a3e7b8ab4e6b1c3641", @nested={0x34, 0x18, [@generic="c28eebf72c09a4c7c646758d6a8c6266ce4de48517de191002dad628aa50c4500e81352239", @typed={0x8, 0x55, @str='\x00'}]}, @generic="dc1593fc5c4d93287d6500d84c2801447e5ba7371400709597c2d889c1add7167c86f3605470ce594f9cc2b5c948f689d54ebb629198ef571df92cda67b6032d3b104365e1cc3bd35bf298a34417d26125200c9ea9a1ce3331d8db2dec561d2d7f453b6cfb6395cf1c15f35b03b87790e9060e457cb6c9e11f55fb1d1045ce149868678620d0a6820e9098de81d4db75fa9ebcdfde83e700585fe17c3d9295ab945788c7b69425966c4ef79f732963a2089319837291e6a05a2607f0df987abb153782f7e61d95986ed8f30f34ad026a99cd9fa71464af629e3506f6e1880a219dbc024617fad707c2604c1c21d704909e73c2cf28", @typed={0x8, 0x4f, @u32=0x80000001}]}, 0x4b4}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) 03:40:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) recvfrom$inet(r0, &(0x7f0000001180)=""/141, 0x8d, 0x0, &(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000003, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @multicast1}, 0xfe7c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x200001) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000040)) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2857.514100] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2857.523555] input: syz1 as /devices/virtual/input/input4673 [ 2857.562403] input: syz1 as /devices/virtual/input/input4674 [ 2857.570331] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000008000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0xffffffffa0010000, 0x0, 0x0) 03:40:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542bf30946b1f40434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001180)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) sendmsg$can_raw(r3, &(0x7f0000000bc0)={&(0x7f0000000200)={0x1d, r4}, 0x10, &(0x7f0000000b80)={&(0x7f0000000240)=@can={{0x0, 0xff, 0x6, 0x5}, 0x0, 0x1, 0x0, 0x0, "1e5bd00ee9cd91be"}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2857.829880] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2857.853254] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x2) 03:40:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0xfffffffffffffd7b) r1 = dup(r0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 03:40:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300004009000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2858.025559] input: syz1 as /devices/virtual/input/input4675 [ 2858.088929] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2858.105973] input: syz0 as /devices/virtual/input/input4676 03:40:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x3) [ 2858.193236] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = dup2(r0, r0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000000)=0xf000) 03:40:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:52 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000010000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:52 executing program 4: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x2, 0x1, [0x7]}, &(0x7f0000000140)=0xa) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={r1, 0x53, "8d3dbd7180babe42df56f8c9877b9d327dd889df080ac9d19dc1460691f8d2d8f58ef16d00dbed0903b48853eb8c2e27907123b1b7eab29121c1cfc871c4599723352b7f55d890b65642f8a0a7ef12b8a04e74"}, &(0x7f0000000200)=0x5b) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000280)={r2}, 0x8) [ 2858.408279] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x4) [ 2858.481849] input: syz1 as /devices/virtual/input/input4677 [ 2858.491592] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2858.510828] input: syz1 as /devices/virtual/input/input4678 03:40:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000020000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x2, [{}, {}]}, 0x48) 03:40:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80500) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000001180)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000b80)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000427bd7000ffdbdf250a00000004000600300002000400040004000400080002000200000008000200000100000400040008000100060008000400040004000400"], 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x1) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r3 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r5 = dup(r4) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r4, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) openat$uinput(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/uinput\x00', 0x802, 0x0) time(0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) 03:40:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x7) 03:40:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000003f000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10002, 0x0) getsockopt$netlink(r1, 0x10e, 0x8, &(0x7f0000000140)=""/205, &(0x7f0000000040)=0xcd) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000580)={0x0, 0xdd, "7f238d8a60d116234c02d650296ea5a7dd37bbc35525c3bb7acc3d64659df3bca7eb87fdf1c54a9df1a60560ea23ee2228f74a9cdbe7942b0a8772ee617a1e890ae9f19b049819f68b6473d151e78d17f1b8fb311a48aba3a7a4a987c2e471a8351689f55e9d875938caf3443a9b3b7c7fb8fee45da41e80588b9fa335cdfb4655e875280515b39bf617a1c29f0fd3bf66b72a66ea0a10acd924d7967361b46adc975fc1a29a80d37160a776f5e7669db62b977b9fd9a6676cd0e4dba3cf492a0f269a456ff66a8dc610e24e5f3a46aa7662d6f8547f0c56c22e7edd25"}, &(0x7f0000000100)=0xe5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000680)={r2, @in6={{0xa, 0x4e21, 0x2c7df5ce, @remote, 0x2b0}}, [0x3, 0x6, 0x1, 0x7, 0xfff, 0x80, 0x2, 0x3, 0x1000, 0x2, 0x9, 0x9595, 0x297, 0xfff, 0x1]}, &(0x7f0000000780)=0x100) r3 = shmget(0x2, 0x1000, 0xa00, &(0x7f0000ffe000/0x1000)=nil) r4 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000500)={'vcan0\x00', {0x2, 0x4e24, @multicast2}}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r8 = getpgrp(0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000440)={0x0, 0x0}) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000480)={{0x0, r4, r5, r6, r7, 0x80, 0x10000}, 0x80000000, 0x7, 0x7, 0x3, r8, r9}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) [ 2858.795753] input: syz1 as /devices/virtual/input/input4679 [ 2858.809454] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2858.829065] input: syz1 as /devices/virtual/input/input4680 [ 2858.852023] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x8) 03:40:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa4ecad6665706de0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003008000a0000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2859.198194] input: syz1 as /devices/virtual/input/input4681 [ 2859.213522] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000cc0)=""/60, &(0x7f00000011c0)=0x3c) r1 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r1, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000bc0)={&(0x7f0000000000), 0xc, &(0x7f0000000b80)={&(0x7f0000000240)={0x28, r5, 0x300, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x1a) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000001180)=""/39, &(0x7f00000003c0)=0xfeb6) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r6, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2859.243800] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2859.253441] input: syz1 as /devices/virtual/input/input4682 03:40:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xa) 03:40:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0xcaf7, 0x4179, 0x2, 0x0, 0xffffffffffffffd5, 0x0, 0x1f, 0x101}, 0x20) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x80000) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x6, 0x3, 0x7fff, 0x9, '\x00', 0xa8}) sendto$inet(r0, 0x0, 0xffffffffffffff45, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x500, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffffc}, &(0x7f0000000180)=0x8) writev(r1, &(0x7f00000024c0)=[{&(0x7f0000000380)="4ca847d534559891654cc1c9188ab89c7110d42e89660b7d65212a6ba74567d9a215de5560fbaa4da75d09f223ab0005184fc21b433b625792a3de7bbcd806b7c3cc68aeebcde3336b8a57ecb0796a225be3ddb729c5d31a3cf3699f9e9d5a54c86174e6d05011bcc272f3026fdebd251bcbef7da131f9da9c118a850cdc292b5d0f8e7c3e3338464235b6af3b96da7310f71ba974b030984ea3084fce1c813865f382f743f8cd6d7575cffcf8914a82f70b146e202081b94b7a85f1757cf0b5cb77cacf9acab4196f93eb23a300115cb9f99f6d4b30542227c7812761c944f7a1812da8e3525c28ac649d2c3629d0c57865a75c2929d1fc16624e1541316c851f365437b2a3823be1a5cd7ad7ce036e921a2b7e9dd886b2cef95b07e92c8032e03d6ea0f52a8a8be47ce4f8899ea6e39975e43b8cd6e4f5e701e6e1d1f1f9527f1140ae338eb9f5a33ba66509358ef29013b01a69fd0fa269d4d1cb81ffe9a3a660fe9e1bc8f33a815275ec4bfe7232ceb8247cd4760ce8c8c3d05465835007864deb3bbdd0cc521d3de7cf60b91883a5aa803cd667b6d102294d1622d28d4b7f763953659d3528d0d4faf9057b4039258adf6160caa4b66b1847265fe5e2212c3a100beb7c04946074e3439a484e61a011e903c18b2374a718b9ce6220fa67b5c25f7cde7ec7cdc48c8a8dfbc00b5fe22463710b7430723605c2aea448c03363f19e61402c49b50768fe239e8b2c00744b01d6c1bcec7be1955263fe6d771bbfa02c1528499d773ba0db18f41d9f8382630dc0e3bd94fa00ea650cd429dd360aa65e8a0d4deea3efc8c58da5e3985ff2eac7a3484aa84b09a32f3f581e1bdb9ad8e9e470028e74ee2a9ee956399c5bb37b8e87052745585babbd1c31b3d71548ac0d85787ec4b446d1b6f3ff6588695648682e761f275ef6fbb8a3a76770dc4f0d596c09b99a225c5a15fd908df4e92f5c2e621839b8721c3a73989660d0089b9971afb2728667295f1ab6051c0afeec1cb8b13de557a0a5eafaf020c473ab702e8d2837f9d165aa5dc8f5653d940b5ed06bd32d0f161570ccdc59a97df87153651ba66ad9e1a5e80502bb3fefcab73e785fbf81c2e695308d5a749f8f40f7773f1a9ba075d65b0eccb8f6630fca30155e0e78457d6cc43ebdc73ce138144004af0bf01340e5405e9d179b35a4ef569bb10388b3de4a04063dde06bf1268b89647227947ca868af0d61d060e5c8daef6c65787bcf6b55d6e49318715d66b7c99221b83b28fb22ad440a347bbd896718a2ce89a5b5c74abb62cb387e5f8b8087b96f79bbd3015cb9a9c61c2d9365901f0ff28c36a185b03f62d2696fd7a319b492dfb4a2b0b7339c49126bf9709929ec1bf164525be5a4f2bf9b480395624914bd8577581093774dd8cb95baa39471856f16a638fedcbd48ff774eac8f38813829823d1716238e6e96ac5e1d5e9b71dfb32c67c700e8f4dbe2f2c61a02211f7f24f834b3b8557460a13d1f5bdeef1e1096142db27c4e97e74c89b1b165d767ff374daecf60c4a3051c94ac3fced98f7656721176443b21b46214bbce4f6d85247391243b4fd94516d05617d92eb13dc03971de3363346672043391b7485774c4f22dc7fd15a6ef1fd496226a4b459eee0a6e2fe414789b314394c7771980ea117e9b6f5e8490063747bba596a7d58abf3423a40e6667b1f6fc9dcb9e1f512f4dadae498c6f98d4a2e94167cd099d5e516d8b500727163cfe482ae58736e1eda4bce448ec4e972a021e1ecb3e6c2bf7ad9b407ce95a9682d6f963061c21b169725b05e741d2a0f272ea4f40478bddcb870b0fa3b0a2ad454215d035c41a5f252b76ce178eef776b8add9e6327eaa20fe13aa00c0309326fd310404f1b93099610f968979d5f92a94dc3dbe0158aa69d5505f4808fb0c22bafc2d22f441f45eeb5c810e8bf046e89b2148dc8babaeae16caa6f994069b93c4dfc87a000dd2e38a1b1d33be590d8f5434d8399d2b3eb68daa5d9a22fd3d1eacaec586445fb9f55e9eec97f53e2687e8502cd5821c60efaa521a716ad3324e06a15382796bd335eef215bb810b6cf16cf68cd0ea156fa308bb3161a08f7b56fb93601c2b533c166e07325b688f259b380f88ca69310ae0a9073369a0ea399528cdd468d1ac9ecb3a11d14fc4ffab7403cad1590a981b1d06974d74c88d782d0654543bf27ea95825e56bfb26477e6399e6471d9a65d444b311cdb207374946a1b261591f88a33b6cd66b1f82ca67070489eb5fae2b0149f0537afa1967a1cdb98b502887f4e1beeb6d7330ba6a34f30c25c20ff7def812591e23fd7f9a8094a6cb4eaa7cadbda5a0664df1341a5ee19dd8b0be37eefeb3ecec5ef95a82438b041dd0f44ffba2beaa028549902f476e7075f9898231f7b15bc6bf03fc38f142ce099ce9b978f4b336e3655e26686884bc0c02d114657eaf388610f9f2b551d411af30a845708cbbf22b97b132fafd6c5444f686c1e0ad2af615e9319daf19d8b0715bff3b0240abf792be2851e9eb9c09a4872dd34e054abe7d4b11362b7acae3cca68a3bffaa10f7e17be63ac11ac25c9b6ad10c8b548e6ffe9b6c6d97aa4d481c95a0900983af9082565c76f0aaea67829e153fe2481d1520dd39b52c3395779bba4c21c941986fa0b1ee184376c8fc5e7f55a044d0992f9c67af3be43f881469281e519dd14acac6ff9cec771039427fb1802927cebbb84a670e22c8405b13a2dda277678860c38375d8cf53add76741dcd14cfa64770e094a8d459d51026a9e98eeca778fe30ddcd44bf342218d6416e5279468270b7edddcf965c1fb2c63858603dee74809cb56b9ce53ff44a509eae8cdd483271a6650c6b9ae7019aa1b1aca3ae67ad50bc8e2acde6fc3360129dc47dd1c9cf1eafd120428fc8438f13d5d260199a684f43cd438cd1ca31ce7c1709d919faaa2b2cb29431c76b5181556bcb7962448a2c395a15903fc9232e35cd0e6fed19ae92cb6c3ebf746af86d3b73ceb70c1dead822ee770a23860a1366048f4c5e43de74830bd14797b90717d1d509a72d4499df67f9b978ef6ba48d86f5c87c38425e2845c987807d336bdb2eba4d8d109cc623a912369ead88acf44e5fe018bcd79b178b33d7e8f3f70216762b86963c52db94fe4813a05f879915e272dad90ccc28ae80230da54e674d7c758b2c162d4510dc771cccf1113c3a399051443bdf2dd9b35f529501451968a49c3dade38c97641d21cec9956e9f6de8a2014a34d6bde2b30d188e6a8176106040ac5c60156105028ce62712a906409f5fe402e3a661856bc7a4dce2b826e782d96f119e2012c6695de62db761774226c5a4c437876d17299d87ed2f6b2156be255b8d022011145e1bf75ec3de1314c90773f69bebec7286cff7af9a6ceb32a850306d230c48f4dde2aaca34e3b9553cd188822a6fd28d80df41a070425a10791f404fc17cc08d57206b3f4eff77d2025348ab918b351ea785a6f5d1f160c1f46e09f4b23550f112019652c96d2b6391dc6e20d09a796c7e9eb4c3176e93702a5c8504cfe2e9d0d54af02ccc6cbf7ad1a470933eb89a20dc611d9daf1d9531eb63be2b6bb257a3e5eb86b012068fe6df28a9fab2a332ded50dc677adff43bf84928b8036ec4fac2390da6d4d9eb38ef6a1bf0ed5a697d1cce06ab5bd7ec8c916d7a84430d21af222213341b212ac71382177fbfee652846cce5a41c8ae6311e3d8624862af34cdd3b7c855d42bae91694bf9c96ecbff3fb43f4c39de8c119238aed9d40036542bb65403847164aea9bebf6a09772db674218086dc91a0453aba98ad01e47efa0ec6dae4e1d039757846461db03cdb2b6358c36f2aa3b9e7e50d7621ffa7bf661d4185fcb11967fb842808fd56530603c5842dd2edfa8264433566e6054e153458d468482da2830320f72024f13d124102269ed2709a0fc89a998be20da3cb7ecdd9fea7bc3b37ba99803b53d6e8434d6f3f19c36fa41908966d0aaf4027158ec7dd1d2166c725985992077d648cf314fe3c46ae7faba4ec300471ddd53c2ac76458e9ad5bc6f9a8f269681be4235eabce4174b64496cb7b410d75cf5b78864a7fb63b87ffb0580c4bc3e522a72f1081f7daec3622d75a4c0ed215a859decfd0f1ccaa665ed2e4ccb0f21ca1bd7a61bbcff36b20e63c984c21831dd1082999e41fd207be3e3e18f26c005f6ce4895186239c4ec8145d018023ad91c32fd05dff897f401222f8b6deb0ec716cbdeb8421ecdd4935971df4aaa3d4586620529bfad1b82ef817d1a3e79124cde9007520a2b5282608c87ffc938c30476fe67e0d9fa83291de116011d1cafdd2277388e8da164370e489adabf9bf078a30060c49446f60d57c9cccdf7c9a62cb2b7feaa081fd5681d038d55a95c2b6170c3d4776d3ea492c637adc6b1fbdd485150c8dd65ba3d566775c796c3b9466179387967af281b9d834d84b16b25a69b770820eab652f7d7ca325fef40790ee4f7559837ecca588a55983c19ad932b091247e0076a1ade2275013dd9bbde388aa60d28f9563dde136ace2f8e91984530b09cfee8c2e50de3c4976dc913ae64472a7cf83ce2f59db5494ac400b92f96fa75b21ebdf8db3b8bb89f0bf1a59076fb6557ce44fbfd830d0cda6fbccae59634e61ed4e09101c623f0b89b816ee9239c1cfdd7f7f2f69901d07e901f574d9c24df7acc1a960e86ba1bc71cb57f6ef411fd1cf32eef61bac40220de1a92021b804e0831c001ed88d33b3671f3112b20148d079952ef95655aebf72bbd88b9ce2db18494f9888fa891b9cfd7aa4f5b949c682c8c80c9425927d22a2943405cbdfb9ee7bdae3da31ab7d37e8e143bd2f6518f797a78d73324caed36a5b875da9a85ba4025ca86cf8ec37150528adcaedb48e6650a8d7dafa879f73271d769e174b948e84213b53b552a77b43be743a16fa12668246390bd48c662c09dee8ecfecb7729c6e015b5fa4611777bf69c1a650f17f139f1ccd14a5e1f1a6cd57bcb4b240173cfeea00fb33361c70a4f37fe217734468b773228e214107d39a2aa82fef196b6593f0592bbb8582164ea9219227b856dd7fab122e0388dc4b5389a08d360bdcdcd5354dbc354e1d740029c4d048a2e25332f06e1d707854b851af6d2477fea59559a37d4117c6e673f7f5f54bbe452c18656ef40bb9c573d0d1f4c6fe39b614a1ba19222e7a676f6d05e8de30d561fcffac52f434b07180a04b86dee1fea9088e248298ad9c41cd7b8c4f15a03b0b488fb792082a6155fa1f160485baf62d98af426f47bb0610efbfc83491b043eef2c24ff23cd0d8d878fc66a60dea3ce6aa4653dbb5889413f8c2afde689cb4e40c0ad45acbb4eafaf954906cfdecb06339601a0a37ac371ae32e7f8936f53e584e40355427df0f9e044bfe358cc413c80f425179592f71e6d9749cadd80d77199664a175e6f6e104cf471607d8b88c9c6b759b78864dbabb27e73df81a16889b62ab20d132d1ca42288d31ca0e5a042ec1b634c3f134406030f03ac09991c094fb7c8c4c9a1742e84576924f4291709ebff832fb7d7ac6d48d90855063bb0f36d307d0a97addf37d884e8797eafab0236a2dbfad3f7d08eca8f2935db1fef68cb0a2e01318fe078839f9381408e3ceed8fdd893f22b1bc1b25d1c9655f19565f59242f0cb2a1e2d83b180209904eabe2d5af708d955788ac570711a179033bcc6024bf2a0ed95282499d7b25b802216f2431d45a2a5a775c4a4bde6c1ad83497c943ed98bae0252f4c", 0x1000}, {&(0x7f0000001380)="6babae87419153eb8f7d0987523f3342d7fc66393034a5e137a2f5d4a677632b7dc5c4e9b60565fdd58b57f87b8eb0d7ae29a90bb00a92688d2c2fab61f53ff9accd579fd7609621cd6607e6b3cd80b0ad25ce4997782a565213764733ca1be3ef88aa2cfa8f6de577559cc5fe931fb4e1694ac77c3fa345298002a320e01a26dd99c7ec13a93c1d66b02b10f288774b68339d93769c1e2dcaaff55da5f9a2018128fd9b210a465e552fc5eefb31ee2e5fc728fa05f54b7e4bdc762febf6c6906398d06a00143e513b2c0852464001e13a65b0a8e1810264c146c9094ca28df08278ac435a85a758d7", 0xe9}, {&(0x7f0000001480)="fdd6ec90c5f40d6affdcc4dd858cb0717c605063261106cd460cb33553c0f0", 0x1f}, {&(0x7f00000014c0)="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", 0x1000}], 0x4) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e20, @remote}}}, 0x84) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000340)={0x2, 0x4e22, @multicast2}, 0x10) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000002580)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002500)={0x0, @rand_addr, @initdev}, &(0x7f0000002540)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @dev, @remote}, &(0x7f00000002c0)=0xc) 03:40:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000001a0000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x10) 03:40:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2859.487268] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2859.540083] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2859.707812] input: syz1 as /devices/virtual/input/input4683 03:40:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) getsockname$packet(r2, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000cc0)=0x14) fstat(r3, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@empty, @in6=@remote, 0x4e24, 0x116, 0x4e23, 0x0, 0xa, 0xa0, 0x80, 0x0, r5, r6}, {0xfffffffffffffffc, 0x7fff, 0x7, 0x4, 0x8, 0x0, 0x78e, 0x4}, {0x80000001, 0x100000000, 0xc47, 0x2805}, 0x2299630d, 0x6e6bb3, 0x2, 0x1, 0x3, 0x3}, {{@in=@broadcast, 0x4d3, 0x2b}, 0x2, @in=@loopback, 0x3500, 0x3, 0x3, 0x7fff, 0x1000, 0xffffffffffffffff, 0x101}}, 0xe8) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000001180)=""/195) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r7, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003ffffffef000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1, @multicast1}, &(0x7f0000000280)=0xc) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0xd00, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x108, 0x3, 0x2000}, 0x4) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r1, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2}, 0xc) [ 2859.765145] input: syz1 as /devices/virtual/input/input4684 03:40:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x15) 03:40:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2859.923223] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2859.981407] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) clock_adjtime(0x7, &(0x7f0000000140)={0x8, 0x1000, 0x249c84e4, 0x7, 0x80, 0x1c000000000, 0x1, 0xffff, 0xfffffffffffffffe, 0x81, 0x8, 0x9d, 0x1ff, 0x7, 0x0, 0x8000, 0x7fffffff, 0x9, 0x0, 0x1000, 0x4000000000, 0x5, 0x7ac, 0x7ff, 0x6bc, 0x5}) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000037fffffff000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x35) [ 2860.160380] input: syz1 as /devices/virtual/input/input4685 [ 2860.200865] input: syz1 as /devices/virtual/input/input4686 03:40:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b26370a58556d2542434f59ca8f79c4b813033c24767d08c100000000"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xe07007129e27fe5a, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xc13d, 0x1017ff) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000080)={0x0, 0x3f, 0x701, 0x5, 0x9d, 0x1}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x60000000}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000001c0)={0xa, &(0x7f0000000140)=[{}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000200)={r2, 0x3}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000240)=0x1) 03:40:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003efffffff000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2860.321611] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2860.360351] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x1a0) 03:40:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2860.559215] input: syz1 as /devices/virtual/input/input4687 [ 2860.589134] input: syz1 as /devices/virtual/input/input4688 03:40:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003ffffffffa00100001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2860.653359] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x240) [ 2860.695948] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x42c6d419b4c1cca8, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000080)=0x2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000200)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x1) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xfffffffffffffc47) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370458556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9cdac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) accept(r1, &(0x7f0000000b80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x80) sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974f92e766574683100000000ffffffffffef00"]) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000340001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x300) [ 2860.975257] input: syz1 as /devices/virtual/input/input4689 [ 2860.976753] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2861.008892] input: syz1 as /devices/virtual/input/input4690 03:40:55 executing program 4: r0 = socket$inet(0x2, 0xbffffffffffffffe, 0xfffffffffffffffe) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000580)={0x0, 0x0}) sched_setscheduler(r1, 0x5, &(0x7f00000005c0)=0x9) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) bind$isdn(r2, &(0x7f0000000140)={0x22, 0xffffffff80000000, 0x8, 0x8000, 0x6}, 0x6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000500)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000540)=0x10) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000240)={0xffff, 0x1000, 0x666, 0xffffffff}, 0x8) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x19) openat$cgroup_int(r2, &(0x7f0000000080)='cgroulE\x01$0L\x91\x99Tdren\x00\xe4\x8a\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000180)={0x0, 0xf36a, 0x30}, &(0x7f0000000280)=0xc) socket$inet(0x2, 0x4, 0x68f8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={r3, 0x64, "cad24be5b2c4124d00e2b74716985afbd7eff7126d3df02fc5a34a5f8d8429a8fe4ce5e00d238b8e8509444213bb804728861da2e6d027c08c6ba1aacea8960a6477263e7d5d76259d0d70d6a8883997e64e36925c6e9ee52663f70cbe8a4a351a8837b1"}, &(0x7f00000004c0)=0x6c) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2481, 0x0) write$P9_RREAD(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x45) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x7f, 0x3, 0x4, 0x7}, 'syz0\x00', 0x2}) [ 2861.052800] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003ffffffffa00080001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) r2 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) prlimit64(0x0, 0x6, &(0x7f0000000100), 0x0) setresuid(r3, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r5 = dup(r4) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r4, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) 03:40:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x700) 03:40:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x0, 0x8, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @rand_addr=0x7, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, 0x30) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0xfffffdb3) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e26, @local}, 0x10) [ 2861.277638] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2861.320467] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2861.362175] input: syz1 as /devices/virtual/input/input4691 [ 2861.390350] input: syz1 as /devices/virtual/input/input4692 03:40:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xa00) 03:40:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x37bf8) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffe5f) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000011f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2861.546445] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2861.575235] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x1500) 03:40:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xb5, 0x3d, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x19f) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xa, 0x400000) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4f1df295f63349236f6dfba2e1f2d64ff78276b760cf11895751dbae3f7f676b2a6d4e8d8cb66c6c7517a079cb4ab2", @ANYRES16=r2, @ANYBLOB="100427bd7000fbdbdf250d0000001800020008000200200000000400040008000200aef30000440009000800020040000000080001000008000008000200ff0000000800020008000000080001006b0a0000080002000080000008000100110000000800010008000000180004001400010062726f6164636173742d6c696e6b0000"], 0x88}, 0x1, 0x0, 0x0, 0x4008000}, 0x24000040) sysfs$3(0x3) 03:40:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x101000, 0x0) getsockname$packet(r1, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000bc0)=0x14) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000200)=0x4) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000021f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2861.870191] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2861.885756] input: syz1 as /devices/virtual/input/input4693 [ 2861.907006] input: syz1 as /devices/virtual/input/input4694 [ 2861.914081] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x3500) 03:40:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x5) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000041f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000001180)={0x2, {{0x2, 0x4e23, @loopback}}}, 0x88) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{}]}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e21, 0x7, @mcast1, 0x2}}}, &(0x7f00000003c0)=0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000400)={r2, 0x8, 0x0, 0x5, 0x9}, &(0x7f0000000440)=0x18) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000280)={0x0, 0xfffffffffffffffc, 0x3e, 0x65c8, @buffer={0x0, 0xd, &(0x7f0000000140)=""/13}, &(0x7f0000000180)="493bed82472f9940d1157529fdda5499143d426537db1e78f136f540974a9cea45a1eb60b727525424b939ecb3bc423fba815a4706a0ee6c6f0831b273a8", &(0x7f00000001c0)=""/71, 0x3, 0x2, 0xffffffffffffffff, &(0x7f0000000240)}) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) write(r0, &(0x7f0000000000)="796ee6cd5372f7be9a9472c92b5f2124e4b40e027666d9fe8c64914b5e60c3ab830311360a5bc22a3d2ee9fd5bfed919262e2de839cf70f15c6012dc68c3689af05a283444eefe0e221adbc90eba35eedcec992c604244b5482191c90ba2c80ca7b7181d2776a22ef904c347c82e6287aa38c778891ae1565a9a", 0x7a) [ 2862.206367] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x4002) [ 2862.257804] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2862.271307] input: syz1 as /devices/virtual/input/input4695 03:40:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2862.300887] input: syz0 as /devices/virtual/input/input4696 03:40:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000051f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x3d618) 03:40:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200040, 0xa) connect$rose(r1, &(0x7f0000000040)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x40) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e21, @local}, 0x10) [ 2862.484893] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2862.506902] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2862.622063] input: syz1 as /devices/virtual/input/input4697 03:40:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e1407912c0e083be07afd510ff5103590dc94e96bf8dab11a682853832f2bf85d16ae1d023d469a7e35c05f12e3e90dd489ef24c5248eefffcc0300000000000000cd47f33bb268513827e550"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000bc0)={&(0x7f0000000000), 0xc, &(0x7f0000000b80)={&(0x7f0000000240)={0x34, r4, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8080) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) syz_open_dev$usb(&(0x7f0000000cc0)='/dev/bus/usb/00#/00#\x00', 0x9, 0x800) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x142800) [ 2862.662654] input: syz1 as /devices/virtual/input/input4698 03:40:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0xb) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000081f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x281400) [ 2862.837920] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2862.858474] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'trusted.', '\x00'}, &(0x7f0000000040)='/GPLkeyring\x00', 0xc, 0x1) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x3, @loopback, 0x9}, {0xa, 0x4e23, 0xffff, @mcast2}, 0x69, [0x7, 0x1, 0x9, 0x0, 0x5, 0x1, 0x7fff, 0x7f]}, 0x5c) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2863.006520] input: syz1 as /devices/virtual/input/input4699 03:40:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000040091f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2863.059080] input: syz0 as /devices/virtual/input/input4700 03:40:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x800000) 03:40:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) dup3(r1, r4, 0x80000) 03:40:57 executing program 4: r0 = socket$inet(0x2, 0x0, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:40:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2863.166214] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2863.199443] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x8000a0) 03:40:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000101f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2863.431410] input: syz1 as /devices/virtual/input/input4701 [ 2863.467206] input: syz1 as /devices/virtual/input/input4702 [ 2863.498157] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2863.528291] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x1000000) 03:40:58 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 03:40:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000201f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2863.751537] input: syz1 as /devices/virtual/input/input4703 [ 2863.767835] input: syz1 as /devices/virtual/input/input4704 03:40:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x2000000) 03:40:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2863.883237] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2863.909242] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000000000003f1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000bc0)=0x1, 0x4) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0xf2e}, &(0x7f0000000b80)=0x8) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2864.054627] input: syz1 as /devices/virtual/input/input4705 03:40:58 executing program 4: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)={0x1000}) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x141042, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xc38889284bafd273, r2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0285628, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000200)={0x0, "f3b2ee851ca8df0636fffa10995a0f04f370673748fb583fc8e126f7bb84f387", 0x3, 0x1}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000380)) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000240)) ptrace$getenv(0x4201, r3, 0x8ef, &(0x7f0000000180)) ioctl$void(r0, 0xc0045878) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) accept(r1, &(0x7f00000003c0)=@ipx, &(0x7f0000000480)=0x80) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000440), 0x4) write$binfmt_elf64(r0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="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"], 0x4b7) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0xff) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)={{r5, r6/1000+30000}, {0x0, 0x7530}}) 03:40:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x3000000) [ 2864.103274] input: syz1 as /devices/virtual/input/input4706 [ 2864.154927] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2864.181457] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000801f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x4000000) [ 2864.399874] audit: type=1804 audit(2000000458.930:80): pid=26931 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir735729771/syzkaller.o1gCLI/5162/file0" dev="sda1" ino=17418 res=1 03:40:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) write$P9_RMKDIR(r3, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x3, 0x3, 0x3}}, 0x14) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)={r1, r3}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='securit\x00\x00\x00\x00\x00\x00\x00\x00']) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2864.473267] input: syz1 as /devices/virtual/input/input4707 [ 2864.493160] audit: type=1804 audit(2000000458.960:81): pid=26933 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir735729771/syzkaller.o1gCLI/5162/file0" dev="sda1" ino=17418 res=1 03:40:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), &(0x7f0000001240)=0x4) r1 = msgget$private(0x0, 0x86) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101100, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000240)=""/4096) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000040)={0xfffffffffffffffe, 0xd14e, 0x9, 0x9d, 0x7fff, 0x800100000, 0x3ff}) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000140)=""/249) [ 2864.520321] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000ffffffef1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2864.563425] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x7000000) 03:40:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setitimer(0x1, &(0x7f0000000240)={{0x77359400}, {0x77359400}}, &(0x7f0000000280)) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x0) bind$isdn(r1, &(0x7f0000000180)={0x22, 0x1f, 0x200, 0x9, 0x8000}, 0x6) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f00000002c0)={'caif0\x00', 0x6}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x18180) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000040)={{0x6, 0xfd}, {0x7, 0x5}, 0x7, 0x1, 0x10000}) [ 2864.813469] input: syz1 as /devices/virtual/input/input4709 [ 2864.827728] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec3c9a73466b49b708d27f8a986ad5970cc06408f2be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e145bb5a7235e1424669a1e6fc0f2814f4f2fa8bbfe72327cbb4718ac9493e6f7c855842d58c0ae0a30e60faa39dd0fb3c34a0670d90eefd60460188f6c5f9070a3479e7f"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x6, 0x0, 0x100, 0x401, 0x0, 0x5, 0x13040, 0x4, 0x3, 0x80, 0x6, 0x200, 0xffff, 0x6a, 0x6, 0x3, 0x8001, 0x6, 0xfd49, 0x4a, 0x3, 0xa99, 0x4, 0xbbf5, 0x8, 0x401, 0xfe00000000000000, 0xffffffffffffff9e, 0x4, 0x1, 0xf5cc, 0x101, 0x7, 0x83, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x3, 0x1}, 0x4000, 0xd028, 0x100000000, 0x2, 0x6, 0x7f, 0x4}, r4, 0x4, r3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2864.865908] input: syz0 as /devices/virtual/input/input4710 [ 2864.883088] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000007fffffff1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:40:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x8000000) 03:40:59 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0xa, 0x1) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000140)=""/130, &(0x7f0000000200)=0x82) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x194) 03:40:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:40:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2865.129703] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2865.164213] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:40:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000ffffffff1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2865.190507] input: syz1 as /devices/virtual/input/input4711 03:40:59 executing program 4: r0 = socket$inet(0x2, 0x4000000008000001, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RTC_PIE_ON(r1, 0x7005) r3 = getgid() write$FUSE_CREATE_OPEN(r1, &(0x7f00000001c0)={0xa0, 0x0, 0x8, {{0x5, 0x0, 0x8, 0x1, 0x8000, 0x7fffffff, {0x5, 0xffffffff80000001, 0x4, 0x3f, 0x3, 0x1ce0000, 0x1, 0xfffffffffffffffa, 0x0, 0x6, 0x6, r2, r3, 0x2, 0x4}}, {0x0, 0x2}}}, 0xa0) 03:40:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2865.238357] input: syz1 as /devices/virtual/input/input4712 03:40:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xa000000) 03:40:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000200)=""/71, &(0x7f0000000000)=0x47) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:40:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:40:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) init_module(&(0x7f0000000040)='vmnet1self\xec\x00', 0xc, &(0x7f00000000c0)='eth1%nodev(proc\x00') sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socket$pptp(0x18, 0x1, 0x2) 03:41:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x10000000) [ 2865.397993] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2865.431809] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003008000a0ffffffff1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2865.549202] input: syz1 as /devices/virtual/input/input4713 [ 2865.569628] input: syz1 as /devices/virtual/input/input4714 03:41:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xa200, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000080)) epoll_wait(r1, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x3) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x15000000) 03:41:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000001a0ffffffff1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba51f87adef2c6076bfee9629a50340442897e08000000000000708dff010000ad5970cc06408fa7452be3905c98008e0f93640cf50d49e95b97f95618d583b222e5cc"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2865.750646] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2865.785409] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2865.861794] input: syz1 as /devices/virtual/input/input4715 [ 2865.871133] input: syz1 as /devices/virtual/input/input4716 03:41:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:00 executing program 4: r0 = socket$inet(0x2, 0x8, 0x800000020) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x999, 0x2) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r0, 0x5, 0x3, r1}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000100)={0x3, r2}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000180)={r1, 0x6, 0x7, r2}) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000240)) sendto$inet(r0, 0x0, 0xfffffffffffffe86, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 03:41:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x18d60300) [ 2865.990845] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2866.036088] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300020000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2866.195974] input: syz1 as /devices/virtual/input/input4717 03:41:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x35000000) [ 2866.240936] input: syz1 as /devices/virtual/input/input4718 03:41:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f936418d583b222e5cc65fa662283a957dac08e14000000000000000000"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000200)={{0x8, 0x8}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x8000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000080)=0xc97) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0xfda9) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) ioctl$BLKRRPART(r1, 0x125f, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sendto$inet(r0, &(0x7f0000000140)="c2c71a78b74df0d6e760febb4bccbe8397c950220dc46060608468d8d492cde6ca5fd7ec9ab4d034a90c80630bf08782b9f8ada1c0452938bd970871d2d26805a069c889d4fd0436b522b4f53a69f53132fa34e7751df5bd30deaf8577e93fbf2baaa1fffb182176967cad029af09dff02fd22cde53f81a6a22918f0fb7fe89dbdc59ba253aabbc6ff25597d22cc0e41db3125e4afdf876138d0fc100950adcfb4", 0xa1, 0x10, &(0x7f0000000200)={0x2, 0x4e24, @local}, 0x10) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @local}}, 0x1e) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000580)={0xa5, ""/165}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000004c0)={0x0, 0xf29}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={r2, 0x0, 0x9, 0x7, 0x399, 0x5}, 0x14) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000480)={0x2, r1}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x401, @loopback}}, 0x1, 0x9, 0x2, 0x7, 0x40}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e24, 0x0, @rand_addr="cafa94c19ace207165fed9098021f174", 0x100000001}}, [0x6, 0x8000, 0x6, 0x1f, 0xa6, 0x6, 0xfff, 0x4, 0x81, 0xffffffffffffff81, 0x9, 0x8, 0xb46b, 0x7779, 0x3]}, &(0x7f0000000440)=0x100) 03:41:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2866.414385] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2866.430250] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300040000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x40020000) 03:41:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(r0, r0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000000)={0x6, 0x2, 0x80000000}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0xa, 0x6, 0x7}) [ 2866.608241] input: syz1 as /devices/virtual/input/input4719 [ 2866.677513] input: syz0 as /devices/virtual/input/input4720 [ 2866.689858] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a5034045588688442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57ea8cbf9ed9528263155bdc1b5b80a613de07cfacef6cdd6e1d9f7249136a7011"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xa0008000) [ 2866.746752] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300050000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/syscache_bypass\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r2 = fcntl$getown(r0, 0x9) r3 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000040)={0x7, 0x7, r2, 0x0, r3, 0x0, 0x1c}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xa0010000) [ 2866.937474] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2866.981782] input: syz1 as /devices/virtual/input/input4721 [ 2866.994815] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2867.018451] input: syz1 as /devices/virtual/input/input4722 03:41:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="602c927d015e2f884ad538c6a86c7f07", 0x326) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e25, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffe3, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0xfffffffffffffd7e) 03:41:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300080000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xfdffffff) [ 2867.251719] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000400000070000000400000058040000300200001801000000000000700300007003006e735c5e4302e90d00", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x4a8) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x40400) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000240)) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000000)={0x5, 0x7, 0x7, 0x0, 0x1, 0xa7}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2867.320233] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2867.364725] input: syz1 as /devices/virtual/input/input4723 [ 2867.384917] input: syz1 as /devices/virtual/input/input4724 03:41:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xfeffffff) 03:41:02 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000000c0)) r1 = socket$inet(0x2, 0x4000000000000001, 0x2) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e25, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = geteuid() r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@broadcast, @in=@remote, 0x4e24, 0x3, 0x4e21, 0xfffffffffffffffa, 0x2, 0xa0, 0x20, 0x2b, 0x0, r2}, {0xffffffffffffffc1, 0x4d, 0x4c, 0x2, 0x3f, 0x6, 0x9}, {0x0, 0x7, 0x8, 0x8}, 0x4, 0x0, 0x3, 0x1, 0x2}, {{@in6=@remote, 0x4d3}, 0x0, @in6=@loopback, 0x3502, 0x3, 0x1, 0x4, 0x8, 0x4, 0xffffffffffffffff}}, 0xe8) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000002c0)) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="73656375726974792e766574683100000000ffffffffffef00fdad2752baf78dbe8166c9f075165158e088030927766aefcd4b9204a103567a87281581a6787e27fcdaf6823367fc6f8caa0b3d"]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) getsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000001180)=""/138, &(0x7f0000000000)=0x8a) 03:41:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300100000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2867.501850] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2867.530043] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xfffffffd) [ 2867.705249] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2867.736284] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300a00100000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2867.789467] input: syz1 as /devices/virtual/input/input4725 03:41:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xfffffffe) 03:41:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20041000}, 0xc, &(0x7f0000000240)={&(0x7f0000001180)={0x1a8, r4, 0x108, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdf38}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x88}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xce}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3fc6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x4040080}, 0x80) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000001340)) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) ioctl$RTC_AIE_OFF(r5, 0x7002) 03:41:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2868.002663] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2868.022619] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000500000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, r1) 03:41:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x1a0ffffffff) [ 2868.211691] input: syz1 as /devices/virtual/input/input4727 [ 2868.270626] input: syz1 as /devices/virtual/input/input4728 03:41:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000000)={0x3, 0x3}) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000240)=0x1, 0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000001580)={0x0, 0x80000001, 0xfffffffffffffffe, 0x5}, &(0x7f00000017c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000001800)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000001840)=0x24) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000001ac0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x571}}, 0x8, 0x100}, &(0x7f0000001b80)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000003300)={0x0, 0x1, 0x4, [0x4, 0x8029, 0x3, 0x0]}, &(0x7f0000003340)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000004ac0)={0x0, 0x3}, &(0x7f0000004b00)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000006240)={0x0, 0xa5, "edafaea16dfa2e854d7ab8ffadc04b00c10815b64be1c2c53877da6d06b2bffc3eab9a27ad908b10f60c76b5bce4c2b7b179f2dd6944b8a68753a6556a22556599567d010c43e9aeb278769354ab21f7a26bd33788240b1ce41d2762e3ed68e5c1aa9ed0d63aa9678bd5d1702d52e59e3233babaebcee9ca77aff0ddffa83fc88043aa59827c9080713db90571d1f9d25f1a5ac6cccffbd09fb2a8b1556627098954777f47"}, &(0x7f0000006300)=0xad) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000006340)={0x0, 0xc0, "b7a1d9935d10306028efc7c97fce7019c3a801512a11d14744f60c1493bb8e9654ca3079ce786c87dfd1a6e59dfd8e1f9d0ff507952fdc3b1de69f271020f4634d98ad79ad373ef7469ceb5e7b39a6811c0149adb5a12636698a213290e96dce176ccff52a233e011567ea6472b1a753ecf78243fc40dab4cb0b01c6edb529e77876aa22860ff63e9a145d7215fbd7f66a4dc234f53fb2f35547c6cdd8134c204590c14be7231a409639b84b737291a4a5b56d81c12fc540d5545f38a17862fd"}, &(0x7f0000006440)=0xc8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000006480)={0x0, 0x99, "0576b45c19ad629413af87e84a61f24a663e38721319e02886afa409fc020146f8c061fc88c71bdc53b5089d2e9079843d49fcc36b9fffb80d32615d0eeeeba0f09405d52961fe6d26f83c67ecb71ad872bb00040787f1236649709b3fccec73ffd716672dae2d1ec85740ae5b1ead5c785c4db2e020313cc4f5446708b1efa7e02d4935a7b49d64ca5472a52f7001c7f6ec5a5f5d331d118d"}, &(0x7f0000006540)=0xa1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000006580)={0x0, 0xa, "98f95402f584777dc250"}, &(0x7f00000065c0)=0x12) sendmmsg$inet_sctp(r0, &(0x7f0000007d00)=[{&(0x7f0000000b80)=@in6={0xa, 0x4e24, 0x2, @empty, 0xffffffff}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000001180)="08310904e1ecbfaee96d01114069ae96feba3c5ae6afc1d07bd94f926b53f402ed5f82ca2394cf2cbfb8fe7c78af0c87c91b9190588436d54a811e1a1c8151cd2cb9aa62e40c9a7ac2afb62eb8f7c12ef37360455a1135764b9f54f3652444e48f57f1bf", 0x64}, {&(0x7f0000001200)="25c1e10f7bb1575bf8cfa9c0a0019e73e87560d10a2aab88da770da5305c4f402ae2cc2a1c6200139665625513f3579f0ea628d406f9009bc34ae00c689469245cf80211ed63ef2b844c5c8879d4c04e68cb8c81d845d3265ec6fdb66b020b96b2696b75913d59515c03f8644c292e8f86ef71b06a22ca3968a216c1549de4cdafbb9862ec869110d02d411d3b3e8865dba048f2b4e9d5160b16af262e3fa284ea52f3d1910bddd62d99eae00f91bda5126b3bb8fbf4a8b2c85f03dc5cdd305394348b017ad0aede03028289fd63661dabf1efe18eeda593d136a30f64c27c6be2ea21f122edd7ec41e2c7", 0xeb}, {&(0x7f0000001300)="1b13c9f222fba4718915621dd0269ab03ecb9a957eb925472211470aa29ab18d20f34472f40a8303e98c4534db2c97154c3b94714a308e31fa2a1b3220fa240c55ab26f19b6ecf85b06a83ed8346fc5a9c56ac5df88ba1d05667dd33631a262cbd5010e83f4c6cd9cf", 0x69}, {&(0x7f0000000bc0)="16369d1157e5", 0x6}, {&(0x7f0000001380)="942c4d5f5ecce25d26c976aa1643a27d973fb3577085c6b5df216143ea7bd6f1d227d287c94bea987abe6c5f5b8dd1bb7a8ee6462bedfb8855647ccf6cd63c90ad18081ecf6e6e80b31578197b8f9dd07c84a59d34e56b89b71cd4bd73b1e88ba35ed1f36b7d883be6054c0d6a634506b9c8175904d38213ace74feb0a12644ce36d0552fd069ecf75f4", 0x8a}, {&(0x7f0000001440)="2c89d01fbcd6a03cf472ebcb4c4229cafd37f4343c0d2020131c5a2b0d49710e4773e51024793b25fea78c6dbe455c4cb2fd707083330f715660c56c841b4b21851590654c1082c757d5dc83df30a7cf6dd6a7ca27c746df5df74dc8a00d9013a14cb1ebf1c6153bf6352522ccbe17e211f1f8bafdc434c8e474c7b7383b853f5b999295bed8d539d5da878e8219b6d4f80fcc9af940c7eed5e81bc8d278015190a4abf7cb276d4b142cf7000f2891bb548fe2a8dd7e12ca774983022924cb383762be68f2ec2e7d966c24", 0xcb}, {&(0x7f0000000cc0)="0ecbe4fa1361baddf6fa37ddd0d5e14a6344622298f6c6290b5b0d934a8f84ea19", 0x21}, {&(0x7f0000001600)="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", 0xfc}, {&(0x7f0000001540)="54f4bfc94df25646a60e08fce346a78de07636d986851525ba6a", 0x1a}], 0x9, &(0x7f0000001880)=[@sndrcv={0x30, 0x84, 0x1, {0x3, 0x9, 0x5, 0x4105, 0x5, 0x5, 0x0, 0xfffffffeffffffff, r4}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x2ed, 0x200, 0x100000000, 0x2336435c, 0x3, 0x1c000000000000, 0x80000000, r5}}, @authinfo={0x18, 0x84, 0x6, {0xfff}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0xb0, 0x20000001}, {&(0x7f0000001940)=@in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000001980)="9c4ed914b67577509845b85c98c0659d8c58b5c38b8b20d5e7821408193430613bfc8b93dc002364dbb58f6b3877c583c54cc0e7379907823da71d318d9f9a37708854b4eb50fd5fa8bd942896f313edc1a4fa5b3768a8f7f17f1ffb849af76b2a5057bcfdc3056f0b3578ba325fdfbcbcb8a278cd775dd1ba4a81e81dd3ccfbf43bcc97a0640940618a18868f83dbd0c28a52", 0x93}, {&(0x7f0000001a40)="3882447425fc6836ead3113ef25e35", 0xf}], 0x2, &(0x7f0000001bc0)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x0, 0xc, 0x1ff, 0x8, 0x9, 0x1ff, 0x3, r6}}], 0x30}, {&(0x7f0000001c00)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000003240)=[{&(0x7f0000001c40)="307138f0f7123cd3b1720b66ad1f6dc57df616aa931eeccdf6fac4dfd71b343e27db7c93f2d8fe3ae6264eb31214e27682197ec95bd4e9a92e432d13c00a0147c8218bdfcad015329aedd6e4ac5b4ca632c89c89e0e17f33d70959fd7d66690a7983f22cfd", 0x65}, {&(0x7f0000001cc0)="117934b17c82f06b24be04dfc347642ec461ad722a15521cb689c4ab6656d3621a8617d832923ea2acdccceb1eeaf40fd94cd870ef44bc2cc7fe9765f85f6314f877be57e6690a4158b60b03bb127910cd3e7a8050654cd4d4709c834d3593e1f57f008d84ca86cd432d7511b07119f1b6fd8f6cfa7c549b1e43bf6294ef7d75645b1f899113f6272fd3dd918a41869c1f7bb9c12988176ebf3f7325de975638f1f9ca060fc7da180d0b336515722ae3cfe0b3187cdf68ed1f433e905e71619300a96723853a81be4769049e62188c81abe086c3d425f23ffb03bd19dc36199933c2df7cecd4c076bf18bad1972669", 0xef}, {&(0x7f0000001dc0)="792e996fe7d7c607af1f9ee8fab464384455881142692dde5fa7bc68a414b4943f807263ba8a72a7fcabfcf4d403c8fcd235c6df00a319", 0x37}, {&(0x7f0000001e00)="408eecc6760848bbd38ec9a64aa3ce4c0a1a6f8e07447729c7ab427f323709ccdeb392c2f4b43477f95e36829e29715684a32f4cdcc832b64de705b1de14d1269bd4c516bdc6428bdf14eb9606c572ea37add94fdb890ecd5f59b117d2edcd50aa2b4dd171dff3c677832d3c783591ebf3f30f77cd138fa6d32630c6cf1575cffc", 0x81}, {&(0x7f0000001ec0)="aff93290dcb73e8817af561ec13b7570967317a777b60d7617974bb9f60e9315fcc42e21bddc7a8f447ec91539101669ac3ddfbe6b0a0f2ee11a533863dbc3b99ec352f889ac3af0e8f709b2e3d4f91a48a49e274e073564cddcb1433d8bb5f0af29181b71bd4f6945", 0x69}, {&(0x7f0000001f40)="80bba28b3a0347519554d93ca3f1715780e69e0347f60f9240c726c8c4a4f5fc5156c187b34cedf4161f34fb6fe72dae2d894e46976042f58f30b5bc03246306387ba2a33c2866b0f9eaca5b40a209349d", 0x51}, {&(0x7f0000001fc0)="ad893b5ccba004bb3ba2c0387c6f36df9cd49e741d1db69773d3b091d42bbdb29cb4fafd121b8579166953c6b00e3f45482f36d92f81c486f283384cfd6d03dcb54893e00b20fb04366c98c2058f730ce9b086b75a628481b68dc1078fda2d2b6d25df1123cc512bbad6fadfa87483f7701b4dc034b403a962210f5456bfad36e565ff08468379cf6d553f32cfba14b5b369ca61c063c447fc1b5d1f250db8c9fbfcbc1a07b7f554a80c6c10b59e1eb69a164c9e56f27b97d34949d4690c3c4e6bc1c61c778794d540610a4d8d9980d1c52673fc67003ee6e17e758c23ba2c59bf2d7b8763fdf6fb031f06cc96273eb37edbb6ca06d29ae39a62cc206fdd9057377ca8d814b3743c023d4e052972ed9af07fbf013ccc431dd06e2300c66935ade8e4907203e7c4013b411fbaac43b9c4f713dec1a9559ab7b01f35327942d133fa7da63038660363b063dabdf02db9e0a5e7ffe1c810d2d91908923496caa630d22b3b65cb45f98b462878f8b4692909b57bf33e6bd5e424198726a40bf645f5d664e2c44362f07cdff30d034765377b49740bd32f764a49e5e3243cc3e624c3aee5f9a619feebdcf652391e5b9a7e4e3c12a334d1142d0cebf3c5631f48b31a7ac9370a7ad181c0159c5e83e48076e88c4a7f322687b675ef93996e2951531e95171ffca8a1f126deeb3059611cd575fe5d55c98e9862c4d8b56343574c18eddd97f72788563cdf8e0cb44cdb1168cb5a7fce3e2deef0172d7394ceecc8753491001200c8629507c2c56b755688f1e9fad6d9a69138e334e868ef4c44fa8a512539096ef25f119edc14266eae1be50d5c612da01a03c14406b99877a7c221676ae044cb81cccb0d7bda400fa3cdaa420471a0598382dd6c5ef7b94c23721cc5bdaf79065af04efa8d6d4dd6b24b3c8e240c3d114508e9e2ff17400a704a41ecc3dd5417f32a7b80b57ea52acb37f20d74359c53099e7fa26ab75ac9f888c6eb741c24c700223fe8e2e5d36ed8a23f2436c8896cbe7e7be4e125f0b54292b65b4e8b53c6b6a05723cb2fc669283d0706875f79df5f6de9ed413b0a556719e6d172ba785c8184ed0ad144c618e27502b3042a354e1904ed0f29d8e01e591760d48d219c45c6c1c3307838c122686d9a3b5b04fc7a010748768638528e3083e2b017755d3da48833e653ef34867483ae092ddb0410408d42ac00a834954c3e721d8a053a42538f3fc48155bfc1ea945d12e729e18097c4e99c7b9fda0779d97a932794e3a340488319ad7db26590dd3713d99c71225bf4a8fe1ac39fc719837e370bcb3d7678496c9945dad531372a2ae7d4c3be1c28c604958848b23bf47267c438af9b68990229c5cae2b00e3322917b67685b8f9ce447596f098ade651e971688188dcdcfaefa5ad8ee28381b7a0d00cf5a5e833d00e93c06f06b8a504d01b6ec800592dd4b4ae0407a5966f0e56823e416ee4970ae90d9fd97a8e56096907d7c3c34b01f9bc403ac885bc59fcf00ec1e0c53c2cd7c37b3c412a7ea74bb8b2f537a00a51cf22d2761b791b4ab06f9e00e6c3fecd6074d0b9bb6338cd38d708ba025028d667d6dd1b9b5f510a7b50acd9c5843673044a76d381524ab895fc9ee12fa2aaae32cccac62e714318f6ac37569013b75dc237c6c829dc9f6601b2f5c4de20a63826c93841240324de2fe91da98396b5879398d7252de517cf4599294c7198e3fe8f4d37f6fc95856099fb56c35d9081fea776e87bc832fd3814fe74f2ae06eb580eaded4c6bde03d29a1acbc23c62ad3d5b891fa7219f999825d67d1dd247152adb8809ebaac1a37c1425a75eb88d40e305cedb5989a4452eeb6d1dc3f08ddef6cb09673bfd0068188a0bbc64605a8f22e9a7fa5289d3e9d57552b4e7872d30a62249f02e28a7bd0277bc2138ecc5a601305e06e626c0df8ce91d76b9b87c9c070c3111e5062ce1501d64075b6d6731c91548d96a99ad34f27088997ee389d0929f4741fa6f9388c18249b25f20f742bb12ca253e4b57544b5721bdaebc63ee0fe100ad05bb6243e7a0f245d3752f24bf0c519942d47d57f8c551c1be0d27bbfe7b9fe0ec8119f3b11516b7abea89a2504d2904f1f4ad1d12f8432dc00197d49676e901c046ee9c0b1b863c1eb9b03caaa29e8f8986684f9c1a8d9b888603da21c4251d7d4474a31c3ad443b949b419918b14d09e66de80fa92807932586f06e105a22b89848a977757f3238449b9879d3b309067d49ae6b9f20b643ded3d377a128f5589451d559186555fba9d6f5100a4c60a6f24e14cc1d2932ae94945f37ac5de621e9bcd2fddd36b4bb8189d0396f019c0fb5f9472fac9154bdb1ea8693b75558391f045f731e28f4a8a442fb6b8560a739324de3ac48a453eea0f3b5901ede53040a7569204aae522a472ab314e74b1ba6878e43f7cbeb9bc4823adf59c85d96d24923577d349623b873233aac038e273624ecbd299bda407e75e8537e51d17ef336337b603bf2f99bde3c8f596ce4da12b9ce6549dbe014b1a3f5ff86373eaefb39cab467f8528372f2f3b8b7dba9b5a3b526c33e8a56420b5522db2a8dec31bdd33fc4f1ae5e943d6c2da5dbe57fe1df3cc81c2bc65dce5d19b3511864b288d0c35d87d80d4cdcd90a08a6a930322367718dea58b67f36331f1a28a3c88bea1b530d86d60e779e1d3768a390949a137ebb2d0fc1b4ae13f4c45e783dea06745bdfbb7bcfd067589ac359dcb52e37fb80d75ea2b7c949776c1b774c5e8f256389c4ae1d0b280ab8e2bbfa53c896ff4db671176e37b22219edb110eb24d7f9696c0855a444cd0c60519bf65671ad56f43f6c1d727f85be2e11f1112c63a078aecd2f5c78d64d3700328de91404abf42462a8ac7830d357cde4621c1c8d6976b436c9de0ce059ff3d4c039541f04b50d2db420f4941bd146e63446eb39f70d9b77db55562d490f6d100b4f047dffc1e3c5007a410f375e03b9557e9770d49769ce64e2588cde3291ebaf91d7dfc424cab203748574880e605643a48aac3eb8109f7aebcbfae05fabacace60b441551695d1893b1c30ff160ac3a427d7b3eab752abc765a48440e6e758905cd84cf0f30cf2a58e271bef86ab366e96d17ddd239090d2acb7ba1d1f442043108757aaf0cc56d8d97a3b345ab84c761b3200267c20367244154c6e67dd9b77814a5b2574081f664f8550d622c9113b21890ec606901444cc9091a77a67d254ed7db2c447b1e01b1309c17ba125a126437a32e3fff92ed811cdc2de2681140f163004d8851c3bc40cd5d8cbf4c4bf86e3ee0a4ee1221bff998c7ed7e0cde2867f1ab62e9810dc69727efeafd07446e9076f99b17b11738482054ce66e7c19d1e643e3f2238956b5b46f64adf8dbc1b0f8a3b43af048e4eaecaf509b0358f758f2ff866ca025be1d72fb4904470610eda98a422d87d368104d2cca8e945477f14a03bc33cc968e73e3906be10f43000be2753cfe78c4d04f2c673567cc60b63f153f01af018a011ebc056e395352643b6cb450e3950c1f635eaf89b2d377f0b519abc69a3afbdc638105c9fb815ba1faf0be34619ad0e7dbe11f55b82ebc8c6b17d6b746c2876772e68459da1fe78249a04c0dd728d1768f391f31cb3383e19b790c103130b56b4647497fe5f8133224fb3a08fd42f225916851a3e42b455fb5dd549c6043218f387118113c05f1bff4b3e3bb2fdc663f38e249cc35b003022ffd0c1a8ed5deba1ffcb3d8a3b453df36ee73ac5aa6595334c294c864eb44de57f1e8ee050dcb8bf3342d6d6409669d650b927060241eda1380478b3fd648ba01348987616ad8da0d2141a1abca29ab6068584c33cfb3e5b4fcb17495ffca3c1e89deb789a999fb19a775e71b6d319bfeead82b83b9f839bedd6a0a69f41e20c5efad09667867955a7f8eaea0bd971c178ccd967dede5c341080646b0e2daebfed23daf276e8c757603fc0fdc63652b233c95b4dad65259142aa1a1781f3f2a93d1f8f7fda37eaa4f0974538b847ffafcce7a338d516628af5c93b7e6c2938bb46f56607d0561587517b928c5ae3c80813feb1aa2f057655bc902c08ba4d845ad7165a803e1bd815341a3c46e5a512945a92fef198804b7cbecbf91fe24c862f567f24b3277e21e600a9a5fbc29abcbc145fb37cf2828cb247fb2044d32eced1d80c2c0087000874d927ef75cb31c31c270ce3a0373dd5c5d126d281027e4fb92a34c4a70bc25689923615f6c70c17a35c13e19a7d18e84e8c9f710eb7464898dfd7044cba87716abb9266f526f050bca4f31db903ae177e286491d42f43588671a490163147b59a6d273e756f4e3e5cd740e3c28ec3edca2dd3864dc3d19a440623e45b565d870151999daf4ca837b974721db8c0ac3e109fe93272603743414a894146d882ecaa9b5268e3942648d7c73a3b7fa4ded3d39956c7157823ba89858f632dd2958ca4ce022dde0732622e6f97e3cd0d5574cbb72726ef7f23ceda351ba611fcef34afe156ca48a1257ed5d306ff08d249c7487b1ad7f8b018961a815e25c7af0b7613c3d90ef0a3ff1e0a0003bf19d6eb0396a965fb3a760b64b2fce8b5d10e12dfc5910eb10dc63071aea0550a6f1c90f5a2a2debc64ab14e186b1eaf4326735c81b815365c1a5212ca95206ed169e9828b96f34566459a2a064054d793456815ef982328f5e86ca096f1bf677cd116f92f55574608e72031016eac2c98e5c1e8578317c454d10dd8178e188dc2feae9f964e802302cf13eb486a45508854f49f1d6097ad33e5be1f8cc1e23f1201524b70d3b0fbd671132e635fb922cb2687c3634035a449d5bcad5ee42e0dd10830836cf5ed819bfc1f9db9f3dff17ce04e7fa6562fc5fef377ec39bb1d8447b286f7a2a792cc53671d9e0b5cb390edf5ef7c128c40da732ec8820aa09430854cd156132b3ffe1c93e3859f5205a83ed25af0037b0d5bcd0ef889fbf55fbda4e51498f9e918a2ea35a5c5fc81dc51821ed4e86f64c58da8eff57c105e67557f6b4f3e81006b1a838e063f304a57e176426a71d01d14eaa11a61ccec770e8fda0622c57201064c391ccc6832393d09d738f77f9253b7b6b378a99b66c2adc6d4697345d0207b28b0c836966515ff5d596a76c44b5074f07672d41eb6989c20e1c3366c82a4aab5ef281a4686a70ae3a3277dabf242469752cb54f9fcd76ef54ab76563664078998186ef61edc02374c337e1a199858ec87666809b350015bb7e86a32f88a5ea57ec0168ac01e15032f2d0e051a057cd200695cbab1a7e006b8b3be32cb5a7f9b231f569701b6396c60eafa49ca2f34e1dde8fba056c98d14178132aa7ab75ee7c53bf4ae62d4db0c0dd73d85f970e56bd2cfc8c93232df1cddea6bb486f21124519aa7856252641c3cf7023b07bbf915b25c280e7df3086497ee5f3a3db667cc79101d0adfbba026c9fbc331f1e83ed16289c24e752378ae4faa14851aac03f7d0164c7c2068572f0ec47c6f5fee557d74202db002b8683d1c743ed015b3e95db36109cdb5e0b702f664ad82505a6cd9f9d5cc8b038460e86b4b920ad014a894f7f72fc5568a80306db0c9fbce77e05cc6b8e5e06ef064ee57371d677ef1aa991978952c9057a519e0f7226c09020521d3caa21f46de3216333441c50245153a49219c32e0bd4a1cb9112fe466deb4c4288eea3c755497168cf3e3211918f75e91afe2d73f94b894d21c793d1fedb3bec6fcaac83a14bd2f772646a7b0629daa9244a9b97f0d7bddfc2ce23cdd5b0fb8573e12c83f6", 0x1000}, {&(0x7f0000002fc0)="10a1c736dbbbbdaeef08481f3ae5d9c51cd9d6f61fe9c24ad68a8bcca35a78a751b3552c093725d74ccd6221692f880d03ce89b7b56f4ee86cf6e1d8216edbf25b3c8648f569ffda6649420b4b8367fa1331b4bd1f702836f598dc88526d9a4a35890f4b270bf206bc6ac4fbea764fe6bfac39b300b9013cc8290d6318156ed7704f5170dd62a6b695a125c41cef63a750e93621c8640a1f046ca80861a29a336145dea8653bd5424656f1a89b78c7c48ab0f00f936be9a56fe613c0067acaeb82f6756587e5", 0xc6}, {&(0x7f00000030c0)="774f908879bd349fb0e0cb962057eb509a9962740e0607d4c5f71b76e83228eed777ad65f17dc4c853b60bd3d44ae13ef0f6b516f043491aa6fad874ce632d7bdc5147e78d806575b53e692a29d89c3ea90db4b80b2652d94680816c0d6515092170b819531a551b2913ec3a5ff452d4d861864e5bfc67b4be17f9d9c8b56792e54d06fe6232aa637fed020787c5259de630213cd1cce5e006d590249c38ba38c546d84355d93a0769a92dce14211aa3e0511633745b498708fde374403602a190eb14e98b055b1f", 0xc8}, {&(0x7f00000031c0)="55353ae8b870a1514a9fc02aea3deb92605d3f4130a0470714d1d2017d396ae34e33db739e0e0629eeaaff7b7eaa5ef25a1cba68186c3c7b680a81a5f722b35de38db2f05b277e3f97d65e30a67628", 0x4f}], 0xa, &(0x7f0000003380)=[@authinfo={0x18, 0x84, 0x6, {0x8}}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @authinfo={0x18, 0x84, 0x6, {0xffffffff}}, @init={0x18, 0x84, 0x0, {0x6, 0x0, 0x79, 0x40}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x80000001}}, @sndinfo={0x20, 0x84, 0x2, {0x800, 0x8000, 0x0, 0x4, r7}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0xd0, 0x40000}, {&(0x7f0000003480)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10, &(0x7f0000003780)=[{&(0x7f00000034c0)="5c95b264f4eb6de80601bb45bc815e1710c0b353c228a3f983680c83c47d6197a67f3ab95510a031fb7cedd4b29ad35c9ffa0b02899434da0c299a75ae1c078b8c8592ee413997dd630af0a03d90be28b75e5eab5b59839126d05490d7e2f1f5499291bf8944479180eb9a2efb7eaf1add97f034f05fb75b1dabc54177f90d5c58a3ebc3110b4bc5c5b8685d574adf61f9f4384645cce8c30ec2267c54a33dcbd17e744d498dd9626baf2c204e8d95ff84745df0518a648d34ce9215064a2d0e10888e678fd0e8ad5763090381b013e1709178ee61f6470a94258641a055556530b000ba0d02c9059a0750d240ba", 0xee}, {&(0x7f00000035c0)="93dff39661735e3b9abf762d68702f3f376901dffbf02fb57cab3d4d1017550149cf115947c0464a8c50164124351c2e09997b082aba884689666fb56fe1e085a986c17e7aae87621cb8bfa1977ada31301ea73a43ccfa20e56cef4fe8237034b953a6105cdd782f793d65fb8717c7259bd29ee25efb137d3ab9df953302283998e8c6f972fdb833d236", 0x8a}, {&(0x7f0000003680)="68ec056ff84d73328f58a325bf9613797647c73bf21e9e85aa5acbeea7135cd3c889bfec4e", 0x25}, {&(0x7f00000036c0)="e454ff892b30fdfa9a607f2e61020039e901e1aa46037e7f330b27545a9da3400006f1d3ab58c11cc4289498c4576dfea4f8793bf3905832b9f8864aee9e663df14a2996af3efd75b16e519874c1caf91de7a94198a8c88f5e47be5a8d7e068afcdf7c429a01d07681dc46be9512fbb4dba6d4c7809788dbca9dfa1b5fe51972e52fb69be95c5100590da81bb36ec9317379f18b49bb98f7bb0b964e674bf733a8948dce23ce56895630d726aa05", 0xae}], 0x4}, {&(0x7f00000037c0)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000004a40)=[{&(0x7f0000003800)="7aeabffae7599f2887d9ee95c685587e7c89bd7d5df7cba8a873523dd79aa4f83520a6e9d4c28208e7117281e1a80c9c813d9a6eb31b0402cc592a335836620e65bc8fe5a31bfb80e81e97a9ae84400a2553190312efefe4f211eeea4648cb6aed7bd941812d9911a318884bfd5a9c1eb2b6152352cf791dcb805cd663b9c369b1e2994bda3794b3ecbe91346a4e00ff0d4f1204e13a4182ecc6e6be4fa45c8997d661e7355e8fe2bc1c4bde096a1730ae0e57a14cfd849265d52624e3e4613309deca01479bbc3b2f7209c0db617c79543ddd8ab2a6658abda9d5c17192360e81425d", 0xe3}, {&(0x7f0000003900)="ef459f7541fead6b91e32e4d445136c6b89668412789007e783d0b3647653804cfd8c9d6f8788f52c48f6fca01011e1d76ce322054f6bf81", 0x38}, {&(0x7f0000003940)="e2f972ec3ed85052", 0x8}, {&(0x7f0000003980)="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", 0x1000}, {&(0x7f0000004980)="b81d3df80d8d356f8e7ee0cd6201a908e7ed26b5e9a1759639af211d0b3756de5d4edfba816b89b30f62f47a54e40ead5f4199a3ce028593984380f26d44a0c79e809ff007f1ea0d0e1f0fe25115395429b1641f6f622dac27486b1739217d933a3bec132aaae86d4735d3d551b88491e815fc27bd75ab87b094a80717ee410482b35ff6fb56ea32d3ca35e6c7572c2b7e08a7ae794029755ea9bcd27e8121386c14127a35aee25afab4c1397031921f65621f4cf8", 0xb5}], 0x5, &(0x7f0000004b40)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x62, 0x2, 0x8, 0x9, 0x4c, 0x7, 0x2, r8}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="0658b9ce25e703dbf7cdee284e38cdba"}], 0x68, 0x4040800}, {&(0x7f0000004bc0)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000004c40)=[{&(0x7f0000004c00)="c7ef3cd74a7ec13c1bec3cff0b0e59012ba33d119c578121375d2f3ce9dbf9ad49550b56d4093472363d", 0x2a}], 0x1, &(0x7f0000004c80)=[@authinfo={0x18, 0x84, 0x6, {0x5}}], 0x18, 0x81}, {&(0x7f0000004cc0)=@in={0x2, 0x4e23, @loopback}, 0x10, &(0x7f00000061c0)=[{&(0x7f0000004d00)="8f67785b36641c1bde23c0defec84b984b01c7bfdd3a74e93905ffa80ab8be812b305fcef47ec19fba93ffa1f7bf768c9bcd3ee5a070e11475d6c53ef94ffcf0358fe1e401ebf46771bd7451801d15dff8805b6c7cd382de0911540a814145d2ed298428beeb296b8f1733823d84", 0x6e}, {&(0x7f0000004d80)="4726fde4f012cc1f4f679c37ec3e7721df4fa19e76ec4d945c67ee28c2b88e181ffa55e8d726559ea88b2cef224d20723f11cfd29dd59f56e89c78f73ca69dd6b71a830b2247d1d6b3b48d9d0678f858fa694cff9f40ba9a81efc7b5d4b9f850803f563f476167cf7ee9fa1c5c97cb23b9f33300ea7950ef17404ea4c97b9c5af28f23fd6ee003493524aca3ed42b4fcdb9fa8e3", 0x94}, {&(0x7f0000004e40)="01432b7b8db5f101c46ec4c63af1e688a4913223d3781d30a6f86109588108776fcd9d4328fd250222f2cfdf6de485b389c8a21fb0da118cc5eff7f049bfe0444121fe0daa11881d6ec8ca1cd114169e4fde04aa25556fcd6489687168a490f88a91c1e8b288593314f2ab3887b4e78055", 0x71}, {&(0x7f0000004ec0)="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", 0xfe}, {&(0x7f0000004fc0)="710a856373c0a0b64954a1135563e2be2eb0e8dcbea565a086a7e029bbd4a75f55fa9f4f793e4c4fa9811d58a440d63ac5402b697ca30130f713daca2f8e494bf504118f94ec10e47197f421abdbc370d548fa12ba86446a1f87eecb004412323bb0ece72cff4fdb10448324774283064f075d66a6a4c193d12fcf80c23b29f3de44c744d7f9e449d7c52964c95fdc6b1d90d70070f5d44a4d47cba0dc186b3969", 0xa1}, {&(0x7f0000005080)="7bb98bcb40c89b159da0437ef6c3215e7c1ab91a81a3ec08afb049e73cc0d4335316e1277b56ba75c314466ff3378e55694cafb393e641816d642fae42182abfe32990b4508a4dd161891b4be474448749ad5ff26776d486f534907c90a194b23034a0c6b3", 0x65}, {&(0x7f0000005100)="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", 0x1000}, {&(0x7f0000006100)="e577609062b0e2baaab624d4ec8d72eb5d28d9b343745b54d0824c804057b0ad61aa0d9efe5d75b1ada039ac1b80211e2c4982a8707f45c0c7a0f527143ef83c7676bd7cf9fc75946ec915106ddb4437baf9a7d3f7f19de7eed04771cd953a35dd0f824c50605a1695e061fab1d63526781c067cb38821c41eb3d2fe16ab0cd0c21df1c5ba61bb7f13c44e18e7557013", 0x90}], 0x8, &(0x7f0000006600)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x400, 0x0, 0x7f, 0x4d5, 0xffff, 0x4, 0x6, r9}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x2, 0xffffffff, 0x8001, r10}}, @prinfo={0x18, 0x84, 0x5, {0x10}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x3, 0x8000, 0x3, 0x40, 0x6, 0x248000, 0xffff, r11}}, @sndinfo={0x20, 0x84, 0x2, {0x10000, 0x8000, 0x8001, 0xc7d6, r12}}], 0xb8, 0x20008004}, {&(0x7f00000066c0)=@in6={0xa, 0x4e21, 0x100000001, @remote, 0xff}, 0x1c, &(0x7f0000007c00)=[{&(0x7f0000006700)="9f", 0x1}, {&(0x7f0000006740)="d96a8e1d2ece3a8426aa39655d0c9206dab49f7647ae2f79c7bd5bdf7e82b9ea139bfcbca45f7b9d6e57a8cdb0597bde5cfc7cfaf89a847b1d2403bfed1dd8e771899df2d2e5c6d5ee726b0bb7917d63bda65ba5dabb461f8cbf24c8d1cfc4fce87b006282c984d5f80ae70e4bc1c5519e33b7f5e32afae83dc3739287ba7cd48b343c4a02334fddae51dad3eb4bfc388d2bc5c6cc7145c7a801b16302ec5267aff80d93d7b9db97da9f2d8f8bf9c52993a482aa1b3a97ac7852c4e09ccb45f680f5b037e7de6e21a33f5266902e6954e4c9a226acbf97", 0xd7}, {&(0x7f0000006840)="6fdab4bb8063f9341e8cda34653effa08540b9834a75e74ca5f90ac39d5b11f04b5f9eaab00c54e65aad5ec5d796a48266a86f20725b9c1a40e27d6770b2e724fe490bae89a0eb02cbcdc1cceb763536e8a4f8cebee13a73a4581fa984e39c747bc74e5e2a6ee1d423fb80d9448ab433f4ca204d47519890102d64d6c8c6b6d153e71d4c2e79fcc31c0f01f468a9b49f6eabb01c31b7474fba39d496e364fe7fb98c1847c3c69896f418f26cf115c490797b2fb64af658c87e380d6ed24e96bc843b31fa3ae8d87dbfca9cf5d24334cff9edcbeea36d3f22b30e98de41ccbb40", 0xe0}, {&(0x7f0000006940)="cbc5b19c927b991149e9c4ca41a9048ef8e9f353f852fee9c7fea05e673596cd99df59fbc4f6ec5c5473", 0x2a}, {&(0x7f0000006980)="35e180e42b812bf02079eb386883508ce2d15041f0b78f0746ad00cccf210885bd217b70eca4a624e3d4a9cec1c4fc13905115842a8731b7c5388c423a69a94a2e974260b07e2463808e1e04f49591282e37f92f041730edb79b1c676f54e96c50da903698d032547a9d60a3ed214ba835947b4c2420bb26ad3ffc9e5aee70ef36b1f3af53082e9b3a64be316e30670f7fed2e69064452430b5e98503351bba64d6ae6932520c21491edb376e80e3ac8506698079dbc7ff6bb501ed343c1c101c73ccdae5df8", 0xc6}, {&(0x7f0000006a80)="9a86e2155e025897cbbd8feb8ce8408436d71cb439d6a24e335ef01d63e553875fc30c", 0x23}, {&(0x7f0000006ac0)="3dd331bf0bcd74288f43553139a4adf2383b20e2cad16d84c18bc35da11b1c36902937cdd24cda7a3883f832c7cf43227d1b6ecb156a835c12b262e897784773cc665aecc1666c9a565ccab318ef65044e7920807fd80e51d4de71f724bc354a1825e353c2c4aab243ef5ac28442f4351669e7bb43a4eb64d6e6c15fb9c2804434ccee854043ec", 0x87}, {&(0x7f0000006b80)="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", 0x1000}, {&(0x7f0000007b80)="28c3b01955b36df43ac8791bd4a357147cdc23c363e0c5bbee7e93230f03e5305ae75200671c6f187ee790182eb6f24dfaf5cf1c446ab56b2b7360500cb0009401a87610992c", 0x46}], 0x9, &(0x7f0000007cc0)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}], 0x18, 0x8000}], 0x8, 0x40000) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r13 = dup(r3) ioctl$UI_SET_SWBIT(r13, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) unlink(&(0x7f0000000200)='./file0\x00') ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r14, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x7fffffff, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x200000000000514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x9, 0x5, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:02 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2868.344449] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2868.356293] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300400900000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x14280000000000) 03:41:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2868.525994] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000000)="b8768fecdcb6991834d160276789634fd3c958e014510a7924f2d3abb3489cba2ee6d413bfaec2a87c1295216eb103ef458284a48b7ee049e29ccb6ab8a90ff2248e55969b2119b3c69f8ecae1c6445aa91c8f90", 0x54}, {&(0x7f0000000140)="6216d9531ef00a68148b230fe2ec93a81611ecde404330893b69ef863d7d118a91f5f9acc46bb9f6fedc302456c309ca28824cfd5de907753afd61c1adc91bf0ba7b276e7971f89521d750e54ed0c649432c2da1553df1eac55dfa6d61140d917182d2ceb579dfd0feec94297598c4ea3a69b7566d442c5834201f072ac111509fb579adf29a310bb92bec2f990b7d8f213786ef98c4196031ac6ea5931ef5566317bf3740c43e5c828b8613eeed2fe272", 0xb1}, {&(0x7f0000000200)="8d397e78be3ce1a936f5bb34521b31a09fffad16f4a70f4a8a50ef1e3f5163e4ba974d0a28cf711f8be11f5d4ed2d726b220bc28fc371886635948272f6530bfad6a4dcb", 0x44}, {&(0x7f0000000440)="ed5bff223ef724ea53c6860be2e0095432c517205f9bbc139b89a3", 0x1b}, {&(0x7f0000000280)="b65050d52c7934a640f3767a8e77057c783f191f5f144be3eab66ffe6e961df0ee7c677e0423ffa4a28ed20d0397b17f853a9bad8ff1ada2e78a8270af28c73f5e146e3b8712441a4629a4e28141db64980433ff75bc9088b656568e0e3a0b6134ac7fb2165d226be0daad320914eb49f3fa46a8422901262975aa91a5f6bcd792c8d43795fd8a64d149233dfc07d219c34f4a1f12232137cb63e97fb66e43e2d9c671b0fce1f7acbc48c7ee75d506ae79c527b46d241993a14147614103b52df62fea310dd0221a5e370a8fd96f16070394657942e424d4e107", 0xda}], 0x5, 0x8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffee1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000400)) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2868.598974] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2868.612730] input: syz1 as /devices/virtual/input/input4729 03:41:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2868.676413] input: syz0 as /devices/virtual/input/input4730 03:41:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300002000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x80000000000000) 03:41:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000b80)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xffffffffffffff0e) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73650275726974792e926574683100000000396cde60ffef00"]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000200)=""/125) 03:41:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x40004e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x800, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2868.864423] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2868.874478] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2868.942082] input: syz1 as /devices/virtual/input/input4731 [ 2868.954614] input: syz1 as /devices/virtual/input/input4732 03:41:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x8000a0ffffffff) 03:41:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300003f00000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2869.000948] input: syz1 as /devices/virtual/input/input4733 03:41:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4000080, &(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xfffffffffffffe00) [ 2869.070796] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2869.086810] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000001180)=ANY=[@ANYBLOB="6b7ef31d26370658365f6055556d2542433059caaf75c4b85d8a6ac806249db6141ca781026c4a071fe86f3eac1ccc8eb788411253841634ab682f09ddc56d7087fef70505bf462cb7ca10a26c79b2a69b513639b9e686f5b2da9148919cb8b8b77050a2a982f4ade0b165fec46c34fa39d26bf2b7c28d5ca8dc51df010000809d9d0bbfd7fdba8d7461ad1cc09ff3a02d059d88f1044ffd9e658cb0c05fa3ec7edac22380fefc11c2a9084951a8e80efe05e583fbd2c07a4400"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x100000000000000) 03:41:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x7f}, &(0x7f0000000180)=0x8) fallocate(r0, 0x25, 0x6, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300094000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2869.315341] input: syz1 as /devices/virtual/input/input4734 [ 2869.351611] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2869.380385] input: syz0 as /devices/virtual/input/input4735 [ 2869.395806] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:04 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x400000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x3, r1}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 03:41:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x200000000000000) 03:41:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x80) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x10, &(0x7f0000000200)=[@in={0x2, 0x4e21, @rand_addr=0x7}]}, &(0x7f0000000b80)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000bc0)={r2, 0x0, 0x3, [0x4, 0xba, 0x8000]}, 0xe) r3 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r5 = dup(r4) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r4, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r6, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300004003000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x80000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={r2, 0x1}) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) [ 2869.675188] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x300000000000000) [ 2869.724342] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2869.737923] input: syz1 as /devices/virtual/input/input4736 03:41:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2869.764651] input: syz1 as /devices/virtual/input/input4737 03:41:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x65, 0x201007fd, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0xfffffceb) 03:41:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x400000000000000) 03:41:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000340000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2869.950175] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2869.981243] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000001180)={0x0, @bt={0x4f2c9599, 0x0, 0x1, 0x3, 0x4, 0x0, 0x10001, 0x25ff, 0x4, 0x9, 0x3, 0x83, 0xa44, 0x0, 0x10, 0x2}}) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792e766574683100000000ffffecffffef00"]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180), &(0x7f0000000080)=0xfffffffffffffded) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = dup3(r0, r0, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) getgroups(0x1, &(0x7f0000000040)=[0xffffffffffffffff]) syz_extract_tcp_res(&(0x7f00000000c0), 0xa7, 0x100) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000340)={0x71, 0x7d, 0x1, {{0x0, 0x52, 0x40, 0x1, {0x0, 0x3, 0x1}, 0x4000000, 0x1, 0x6, 0xfff, 0x16, '$&{@\\vmnet0user#cgroup', 0x8, '-em1proc', 0x0, '', 0x1, '\x83'}, 0xa, 'em1vmnet1[', r2, r3, r4}}, 0x71) [ 2870.089769] input: syz1 as /devices/virtual/input/input4738 [ 2870.140650] input: syz1 as /devices/virtual/input/input4739 [ 2870.197525] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x700000000000000) [ 2870.238471] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300a00080000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x800000000000000) [ 2870.482288] input: syz1 as /devices/virtual/input/input4740 [ 2870.502628] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ve\x16w\xdf\xc4\x13\xe3\x82\x05\x00', 0x3a9) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000b80)=ANY=[@ANYBLOB="a693f97148643da9c6ccdb4e6cfefc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc658f82d24956df36c7519a31fa9c"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001]}, 0x45c) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0xfffffffffffffffe, 0x80) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000000), 0x4) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) r4 = socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) getsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000cc0)={@initdev, @multicast1, @local}, &(0x7f0000001180)=0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000010000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2870.544286] input: syz1 as /devices/virtual/input/input4741 [ 2870.567415] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xa00000000000000) 03:41:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000020000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:05 executing program 4: r0 = socket$inet(0x2, 0x3fffffffffffffff, 0x200000000000000) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x3, 0x4) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2870.870982] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2870.891039] input: syz1 as /devices/virtual/input/input4742 [ 2870.918424] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x1000000000000000) [ 2870.986870] input: syz0 as /devices/virtual/input/input4743 03:41:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r1 = getgid() r2 = getgid() getgroups(0x2, &(0x7f0000000000)=[r1, r2]) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000cc0)='/0usersystem)-wlan0\x00', 0x2) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r4 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6ce926cd0d400ff822602a4a3cfbffffffffffffff434f59ca"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752d945f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5bc9cfa5b387e177b35ffed4bb561aefcefbfe22eb9ce6a", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="a693f98a5f64fc33948eba9a50cc49c1d45a7cc997340442897ec1c9a73466b49b708de5906899d427f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618fa57dac08e14"]]], 0x1}}, 0x40002) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r5, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r6 = dup(r5) ioctl$UI_SET_SWBIT(r6, 0x4004556d, 0x200000000000) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x2) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r5, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(r3, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7765637584697479ffffffef00"]) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r7, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) 03:41:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000040000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000003400)=[{{&(0x7f0000000000)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f00000003c0)=""/173, 0xad}], 0x2, &(0x7f0000000480)=""/197, 0xc5}, 0xfffffffffffffffa}, {{&(0x7f0000000580)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000600)=""/246, 0xf6}, {&(0x7f0000000700)=""/146, 0x92}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001800)=""/59, 0x3b}, 0x61}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001840)}, {&(0x7f0000001880)=""/232, 0xe8}, {&(0x7f0000001980)=""/83, 0x53}], 0x3, &(0x7f0000001a40)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000002a40)=@xdp, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002ac0)=""/80, 0x50}, {&(0x7f0000002b40)=""/117, 0x75}, {&(0x7f0000002bc0)=""/244, 0xf4}], 0x3, &(0x7f0000002d00)=""/194, 0xc2}, 0x4}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002e00)=""/167, 0xa7}], 0x1, &(0x7f0000002f00)=""/40, 0x28}, 0x9}, {{&(0x7f0000002f40)=@rc, 0x80, &(0x7f0000003380)=[{&(0x7f0000002fc0)=""/181, 0xb5}, {&(0x7f0000003080)=""/12, 0xc}, {&(0x7f00000030c0)=""/189, 0xbd}, {&(0x7f0000003180)=""/162, 0xa2}, {&(0x7f0000003240)=""/17, 0x11}, {&(0x7f0000003280)=""/213, 0xd5}], 0x6}, 0x7}], 0x6, 0x10060, &(0x7f0000003580)={0x77359400}) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, [], [{0x2, 0x3, 0x0, 0x1, 0x1, 0x10000}, {0x3, 0x8, 0x287, 0x5, 0x50, 0x7f}], [[], [], [], []]}) [ 2871.226116] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2871.241742] input: syz1 as /devices/virtual/input/input4744 [ 2871.265390] input: syz1 as /devices/virtual/input/input4745 03:41:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x1500000000000000) [ 2871.283189] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:05 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000050000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2871.496069] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x18d6030000000000) 03:41:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000140)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x2dafc619d6866df1, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = getpid() ptrace$getsig(0x4202, r1, 0xfffffffffffffff9, &(0x7f0000000000)) 03:41:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864e533948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e9aaf84a742443ca668eaf6aac5b97f95618d583b222e5"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2871.555166] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2871.572702] input: syz1 as /devices/virtual/input/input4746 03:41:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2871.606101] input: syz1 as /devices/virtual/input/input4747 03:41:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:06 executing program 4: link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = socket$inet(0x2, 0x7, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x20) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=0x0, &(0x7f0000000280)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000003c0)={r2, 0x7, 0x6, 0x100000001}, &(0x7f0000000400)=0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000002c0)=0x2, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x0, r4, 0x0, 0x5, @ib={0x1b, 0x16, 0x100, {"a5f495ab9bbc550ad24e02fbaea77763"}, 0x8, 0x195, 0x105}}}, 0xa0) 03:41:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x3500000000000000) 03:41:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000080000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2871.812156] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2871.841680] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2871.888139] input: syz1 as /devices/virtual/input/input4748 [ 2871.938274] input: syz1 as /devices/virtual/input/input4749 03:41:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x800, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x4002000000000000) 03:41:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000040090000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:06 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000001140)={0x0, {{0x2, 0x4e23, @rand_addr=0x6}}}, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x8000000000) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) prctl$PR_GET_THP_DISABLE(0x2a) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) setsockopt$inet_buf(r1, 0x0, 0x2e, &(0x7f0000000140)="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", 0x1000) tkill(r2, 0xf) 03:41:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2872.194328] input: syz1 as /devices/virtual/input/input4750 [ 2872.207693] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2872.235847] input: syz1 as /devices/virtual/input/input4751 [ 2872.257710] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xfdffffff00000000) 03:41:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getpeername$inet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2872.315691] input: syz1 as /devices/virtual/input/input4752 03:41:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000100000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2872.367629] input: syz0 as /devices/virtual/input/input4753 03:41:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2872.486443] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xfeffffff00000000) [ 2872.532867] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000011c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b80)={&(0x7f0000000240)={0x20, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xf8}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r5 = dup(r3) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792e76657468310000ffffef000000000000"]) ioctl$int_in(r5, 0x5452, &(0x7f0000000cc0)=0x997) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') dup3(r6, r1, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r6, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getresuid(&(0x7f0000000240), &(0x7f00000002c0)=0x0, &(0x7f0000000280)) setuid(r1) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') 03:41:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000200000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2872.644786] input: syz1 as /devices/virtual/input/input4754 03:41:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xffffffff00000000) [ 2872.704073] input: syz0 as /devices/virtual/input/input4755 03:41:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000280)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006f51da345b83818ded863ad3c5986aa16401182b286936375909a71be7978af513fafb912571487524fe3ea32497a904abe407e9f527d667aa9b9c6d0ba89fcc66"], 0xc8) 03:41:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2872.838372] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2872.892461] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2872.910256] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 2872.923474] kernel msg: ebtables bug: please report to author: Wrong nr of counters 03:41:07 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3ff, 0x2100) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0xfffffffffffff096) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0xfffffffffffffded) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xffffffffa0008000) 03:41:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000003f0000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) sendmsg$rds(r3, &(0x7f0000002fc0)={&(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/91, 0x5b}], 0x1, &(0x7f0000002cc0)=[@zcopy_cookie={0x18, 0x114, 0xc, 0x1f}, @rdma_args={0x48, 0x114, 0x1, {{0x0, 0x1000}, {&(0x7f0000001180)=""/215, 0xd7}, &(0x7f00000028c0)=[{&(0x7f0000001280)=""/151, 0x97}, {&(0x7f0000000bc0)=""/33, 0x21}, {&(0x7f0000001340)=""/249, 0xf9}, {&(0x7f0000001440)=""/252, 0xfc}, {&(0x7f0000001540)=""/116, 0x74}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/216, 0xd8}, {0xfffffffffffffffe}, {&(0x7f0000002700)=""/186, 0xba}, {&(0x7f00000027c0)=""/196, 0xc4}], 0xa, 0x1, 0x9}}, @mask_cswp={0x58, 0x114, 0x9, {{0xa000000000000, 0x9}, &(0x7f0000000cc0)=0x9, &(0x7f0000002980)=0x2, 0x0, 0x4905, 0x8, 0x8, 0x0, 0x1}}, @fadd={0x58, 0x114, 0x6, {{0x7f, 0x81}, &(0x7f00000029c0)=0x1, &(0x7f0000002a00)=0x3, 0x7, 0x5, 0x2, 0x0, 0x2, 0xffff}}, @mask_fadd={0x58, 0x114, 0x8, {{0x5, 0xffff}, &(0x7f0000002a40)=0xc858, &(0x7f0000002a80)=0x1, 0x20, 0x3ff, 0x7f, 0x6, 0x20, 0x7fff}}, @cswp={0x58, 0x114, 0x7, {{0xffff, 0x1d}, &(0x7f0000002ac0)=0x6, &(0x7f0000002b00)=0x9, 0xfffffffffffffffc, 0x42f6ee9c, 0x3, 0x8, 0x40, 0x5}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x3}, &(0x7f0000002b40)=0x100, &(0x7f0000002b80)=0x20, 0x100, 0x1, 0x0, 0x100000001, 0x9, 0x7fffffff}}, @fadd={0x58, 0x114, 0x6, {{0x10001, 0x5}, &(0x7f0000002bc0)=0x7, &(0x7f0000002c00)=0xeaa, 0x2, 0x3ff, 0xff, 0x3b15, 0x2, 0x3}}, @fadd={0x58, 0x114, 0x6, {{0x400, 0x20}, &(0x7f0000002c40)=0x8, &(0x7f0000002c80), 0x10000, 0x2ef, 0x20, 0x7, 0x1, 0x7fffffff}}], 0x2c8, 0x10}, 0x4) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) [ 2873.015432] input: syz1 as /devices/virtual/input/input4756 03:41:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2873.077332] input: syz1 as /devices/virtual/input/input4757 03:41:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x42000, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000140)="2c71e5d618581a695b16fabca77041be59f3dbea92daae6d966814c44e1838c971721677f2fb7712837f7e3b5bf616bdf75d4f825159626ca4377f04c814f176eb562e0d6aa5f6aee6e0e21f6e8e6cb4552ff26a5052fac99f1b8b5ff9d8ca52cb33d911288ffafbecc3d7f8107f42faba460e50e09671ec0a2ae60be2fc4044a63ba92d2497f651c74306a61b0e3e1212015dfc7ae6fb740ee14d694705b1ea1fba2b0306123db7260a5b", 0xab) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e27, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0xffffffba) getsockname$inet(r1, &(0x7f0000000200)={0x2, 0x0, @local}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0xfffffffffffffff7, 0x4) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) 03:41:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xffffffffa0010000) [ 2873.208572] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300008000a00000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2873.274182] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2873.407697] input: syz1 as /devices/virtual/input/input4758 03:41:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffd5d, 0x200007ff, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='westwood\x00', 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x8, 0x4002) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000240)={0x21, 0x32, 0x7, 0xe, 0x6, 0xc6, 0x2, 0x5e}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000280)={0x9d, 0x8, 0xcb9, 0x9}) recvfrom$inet(r1, &(0x7f0000000300)=""/227, 0xe3, 0x2000, &(0x7f0000000400)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000180)) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2873.460969] input: syz0 as /devices/virtual/input/input4759 03:41:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000001a00000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2873.533432] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2873.580983] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2873.717542] input: syz1 as /devices/virtual/input/input4760 03:41:08 executing program 0: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="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", 0x1000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2873.787661] input: syz1 as /devices/virtual/input/input4761 03:41:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300ffffffef0000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2873.834327] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:08 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) semget$private(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) mlockall(0x0) dup3(0xffffffffffffffff, r1, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) getpgid(0x0) 03:41:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2873.876306] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000200)='\x00', 0x1, 0x0, 0x0, 0xfffffe75) [ 2874.066435] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2874.078806] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2874.129319] input: syz1 as /devices/virtual/input/input4762 [ 2874.164248] input: syz1 as /devices/virtual/input/input4763 03:41:08 executing program 4: r0 = socket$inet(0x2, 0x80006, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x5, 0xa, 0x1, "5226e50fbe80a0af84e3de2583545da8bb20ab40da3f5534920ed368a113105f", 0x32314247}) socket$inet6_udp(0xa, 0x2, 0x0) 03:41:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003007fffffff0000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0xd4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = syz_open_dev$swradio(&(0x7f0000001400)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000001480)={0xb8d, 0x2, 0x1, 0x0, 0x0, [], [], [], 0x195e9f56, 0x27d}) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000001440)=0x10, 0x4) ftruncate(r1, 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001240)=@nat={'nat\x00', 0x19, 0x6, 0x1020, [0x20000200, 0x0, 0x0, 0x20000be0, 0x20000fd0], 0x0, &(0x7f0000000180), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x56, 0x8b17, 'gretap0\x00', 'team0\x00', 'bcsh0\x00', 'gre0\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff], @remote, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@dev={[], 0x29}, 0xffffffffffffffff}}}}, {{{0x5, 0x5f, 0x809b, 'dummy0\x00', 'bridge_slave_1\x00', 'ipddp0\x00', 'vlan0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @remote, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x898, 0x8d0, 0x908, [@u32={'u32\x00', 0x7c0, {{[{[{0x3, 0x2}, {0x0, 0x1}, {0x8000, 0x3}, {0x8, 0x3}, {0x3ff}, {0x1, 0x3}, {0x8}, {0x74}, {0x7, 0x1}, {0x5}, {0x2, 0x3}], [{0x2309, 0x7}, {0x8, 0xce8e}, {0x582c, 0x9}, {0x0, 0x6}, {0x80000001, 0x29f}, {0x9, 0xa8}, {0x6, 0xfffffffffffff296}, {0x8, 0x10001}, {0x7, 0x9}, {0x7}, {0x3ff}], 0x3, 0x7}, {[{0x20000000000, 0x3}, {0x0, 0x2}, {0x8, 0x3}, {0x20, 0x3}, {0x5}, {0x5}, {0x1}, {0x1, 0x3}, {0x8}, {0x401, 0xd01f783d61f040c8}, {0x800000000000, 0x3}], [{0xd37ff6d, 0xc0e1}, {0x0, 0x60000000000000}, {0x1000, 0x1}, {0x7, 0x1}, {0x1f, 0x3}, {0x0, 0x5}, {0x0, 0x8}, {0x7, 0x20}, {0xb, 0x2}, {0x80, 0xd4ed}, {0x9, 0x2f}], 0xb, 0x6}, {[{0x7fff, 0x3}, {0x5, 0x2}, {0x3, 0x3}, {0x800, 0x1}, {0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x4, 0x3}, {0x2}, {0x6e2, 0x3}, {0x3291, 0x3}], [{0xffff, 0x1ff}, {0x1, 0x8000}, {0x9, 0xb29}, {0x7, 0x100000000}, {0x3, 0x2}, {0x6, 0xffff}, {0x73af}, {0x8, 0x6}, {0x9}, {0x7, 0x7f}, {0x0, 0x6}], 0x8, 0x9}, {[{0xfeb4, 0x3}, {0x7, 0x3}, {0x39b08be4, 0x1}, {0x20, 0x3}, {0x4, 0x3}, {0x6, 0x3}, {0x80, 0x3}, {0x3}, {0x6, 0x1}, {0x59bfb89c, 0x3}, {0x8001, 0x2}], [{0x3, 0x143}, {0xb57, 0x6}, {0x6, 0xcfca}, {0x7, 0x2}, {0xffffffffffffffff, 0x81}, {0x3, 0x5}, {0x401, 0x1000}, {0x7, 0xfffffffffffffffe}, {0xfffffffffffffffd, 0x80000000}, {0x3c}, {0x9, 0x3f}], 0xb, 0x2}, {[{0x1d4543b0, 0x1}, {0x7, 0x1}, {0x6, 0x3}, {0x8000, 0x3}, {0x5, 0x1}, {0x3ef5, 0x3}, {0x1, 0x3}, {0x3, 0x3}, {0xfffffffffffffffa, 0x3}, {0x1, 0x2}, {0x75e6f51a, 0x3}], [{0x3, 0x5}, {0x9, 0x10}, {0x81, 0x3}, {0xfffffffffffff001, 0x7}, {0x5, 0x2f}, {0x7}, {0x5, 0x7f}, {0x229f, 0x9}, {0x3, 0x6}, {0x46, 0x672}, {0x5f8, 0x40000000000000}], 0x5, 0x2}, {[{0x2}, {0x80000000, 0x1}, {0x2, 0x2}, {0xca, 0x1}, {0x318, 0x2}, {0x80000001, 0x1}, {0x7, 0x3}, {0x9, 0x2}, {0x3, 0x3}, {0x4, 0x3}, {0x5}], [{0x2, 0x2}, {0x2, 0x80000001}, {0x9, 0x3f}, {0x2, 0xc00}, {0x5, 0x3}, {0x7fff, 0xffffffff00000001}, {0x80000000, 0x1}, {0x6f, 0x2}, {0x7, 0x7}, {0x0, 0x50}, {0x800}], 0x9}, {[{0x5, 0x3}, {0x7f, 0x2}, {0x7e43, 0x2}, {0x2, 0x3}, {0x3f}, {0x40, 0x3}, {0x400}, {0x9, 0x2}, {0x1, 0x3}, {0xc3f0}, {0x9, 0x3}], [{0x8001, 0x3ff}, {0x7f, 0x80000001}, {0x1, 0x80000001}, {0x7fffffff, 0x2b2}, {0x8}, {0x2065f12e, 0x1000}, {0x2a3a, 0xc8f}, {0x2, 0x7}, {0x4, 0x1b}, {0x4, 0x1}, {0x8}], 0xb, 0x1}, {[{0xce}, {0xd1, 0x1}, {0x8, 0x2}, {0x7f, 0x1}, {0x3, 0x3}, {0xc92f, 0xa664fc8089387059}, {0x4}, {0x2}, {0x0, 0x3}, {0xffffffffffffffc6}, {0xeb}], [{0xfffffffffffffffe, 0x1}, {0x6e68575d, 0x8e34}, {0x8, 0x88e}, {0x1, 0x1}, {0x3, 0x10000}, {0x7fff, 0x80000000}, {0x2, 0x10001}, {0x9, 0x7fffffff}, {0x0, 0x1ff}, {0xd0b, 0x9}, {0x3}], 0x2, 0x4}, {[{0xfffffffffffffffb, 0x3}, {0x3ff, 0x2}, {0xc9}, {0x3}, {0x4, 0x2}, {0x0, 0x1}, {0x9, 0x3}, {0x200}, {0x3}, {0xffffffff, 0x3}, {0xffffffffffff0001, 0x3}], [{0x7, 0x7fff}, {0x8, 0x935}, {0x7, 0x2}, {0x8b, 0x9}, {0x81, 0x3}, {0x9}, {0xfffffffffffffffc, 0xfffffffffffffffe}, {0xfffffffffffffc00, 0x7}, {0x5}, {0x7, 0x4}, {0x0, 0xd4}], 0x3, 0x1}, {[{0xff, 0x1}, {0x1, 0x1}, {0x6, 0x3}, {0x80, 0x1}, {0x3, 0x1}, {0x3ff, 0x3}, {0x3, 0x1}, {0x40, 0x3}, {0x2a}, {0xd06f}, {0x8001, 0x2}], [{0xbd7, 0xfaf8}, {0x81, 0x400}, {0x6, 0x2}, {0xa104, 0x2}, {0x2000000000000}, {0x2, 0x3}, {0xfe, 0x100}, {0x9, 0x6}, {0x101, 0x4}, {0x9, 0x3edf}, {0x2, 0x10000000000000}], 0x6, 0xb}, {[{0x1, 0x3}, {0x7ff, 0x3}, {0x2, 0x3}, {0x1, 0x1}, {0x15c1, 0x3}, {0x9}, {0x3, 0x3}, {0x7fffffff, 0x3}, {0x2}, {0x7, 0x2}, {0x3f, 0x1}], [{0x1, 0x3ff}, {0x20, 0xfffffffffffffffe}, {0x2, 0x10000}, {0x2}, {0x1, 0x7fff}, {0x2, 0x6}, {0x800, 0x1000}, {0x7, 0x53}, {0x400, 0x3f}, {0x5, 0x8}, {0x7fffffff, 0x3}], 0xb, 0x7}], 0xb}}}, @quota={'quota\x00', 0x18, {{0x1, 0x0, 0x6, 0x3}}}]}, [@snat={'snat\x00', 0x10, {{@dev={[], 0x22}, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@random='vrs\nC-', 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0xd, 0x10, 0x6005, 'veth1_to_team\x00', 'team_slave_1\x00', 'veth0_to_bridge\x00', 'ip6tnl0\x00', @link_local, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x178, 0x228, 0x260, [@physdev={'physdev\x00', 0x70, {{'ipddp0\x00', {0xff}, 'caif0\x00', {0xff}, 0x10, 0x1}}}, @rateest={'rateest\x00', 0x48, {{'veth1_to_team\x00', 'batadv0\x00', 0x10, 0x0, 0x2, 0x100000001, 0x1, 0x4, 0x9, 0x100000001}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x4, 0x8, 0xfff, 0x1, 0x0, "6ad44673877dd8e555bd531493631bdd4f87bd15683790c71d9a9d0b370369ee3597a14d65cd708256f04e4b1cc7c53008c56623f5279065e771e2fe02aa7e3f"}}}, @snat={'snat\x00', 0x10, {{@broadcast, 0x10}}}]}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}}, {{{0x11, 0x8, 0xed7e, 'nr0\x00', 'syzkaller0\x00', 'veth0_to_team\x00', 'bpq0\x00', @broadcast, [0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0xb8, 0x128, 0x160, [@ip={'ip\x00', 0x20, {{@empty, @loopback, 0xffffffff, 0xffffffff, 0x1, 0x73, 0x20, 0x1, 0x4e20, 0x4e21, 0x4e22, 0x4e20}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}]}, @snat={'snat\x00', 0x10, {{@random="3824d30577d4", 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x2, [{{{0x3, 0x0, 0x15, 'veth0_to_hsr\x00', 'bond_slave_1\x00', 'bond_slave_1\x00', 'syzkaller1\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @remote, [0x0, 0x0, 0xff, 0xff], 0xa0, 0x110, 0x148, [@cpu={'cpu\x00', 0x8, {{0x7, 0x1}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0x10}}}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xffffffffffffffff}}}}, {{{0x3, 0x10, 0xfbf5, 'gretap0\x00', 'irlan0\x00', 'rose0\x00', 'ifb0\x00', @broadcast, [0x0, 0x0, 0x0, 0xff, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xa0, 0xa0, 0xd8, [@pkttype={'pkttype\x00', 0x8, {{0x5, 0x1}}}]}}, @snat={'snat\x00', 0x10, {{@dev={[], 0x20}, 0xffffffffffffffff}}}}]}]}, 0x1098) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140), 0x80000) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/capi/capi20ncci\x00', 0x40200, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000001300)=""/193) 03:41:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2874.416314] kernel msg: ebtables bug: please report to author: entries_size too small [ 2874.428672] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2874.446370] kernel msg: ebtables bug: please report to author: entries_size too small [ 2874.454230] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x2b7) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300efffffff0000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2874.489135] input: syz1 as /devices/virtual/input/input4764 [ 2874.512579] input: syz1 as /devices/virtual/input/input4765 [ 2874.705192] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2874.739885] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:09 executing program 2: 03:41:09 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) 03:41:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:09 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x800, 0x400) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000300)) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @broadcast}, 0xfffffefe) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000340)={0x4, &(0x7f00000000c0)=[{0x1, 0xf0, 0x1000, 0x6}, {0x7, 0x200, 0x8, 0x9}, {0x1, 0x2, 0xec11, 0x100000000}, {0xf4e, 0x6d4, 0x9fef, 0xffff}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='bridge_slave_0\x00', 0x10) sendto(r1, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0xfffffffbfffffffc, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000240)=""/151, &(0x7f0000000140)=0x97) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) 03:41:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000200000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2874.932125] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2874.944722] input: syz1 as /devices/virtual/input/input4766 [ 2874.972060] input: syz1 as /devices/virtual/input/input4767 03:41:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000040)={0xe, 0x2, {0x0, 0x3, 0x4, {0x9, 0x8}, {0x2, 0x9}, @rumble={0x0, 0x4}}, {0x0, 0x7ff, 0x2, {0x7, 0xfffffffffffffffc}, {0x3, 0x68fb}, @ramp={0x80000001, 0x9, {0x6, 0x9, 0x7, 0x8001}}}}) 03:41:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:09 executing program 2: [ 2874.988750] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x60482, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r2, 0x604, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffc00}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffbff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000400000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2875.160987] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x38, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x5, @loopback, 0x4}, @in6={0xa, 0x4e24, 0x2, @rand_addr="2d8200b4c960fb8c6232995e4ffdc56c", 0x400}]}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000440)={0x8, 0x4, 0xe8, 0x7fffffff, r1}, &(0x7f0000000480)=0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x101000, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000004c0)=0x1) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x3, 0xd3, 0x3, 0x400, 0x9305, 0x4198, 0xffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0xffffffffffffffe0, 0x5f7, 0x1b44cf09, 0xc255}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000340)={r3, 0x6}, 0x8) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x16c, 0x2, 0xffffffffffffffaa, 0x100, 0x26}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x3, 0x205, 0xffffffff00000000, 0xfffffffffffffff7, r4}, &(0x7f00000001c0)=0x10) 03:41:09 executing program 2: [ 2875.205561] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x5) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) keyctl$session_to_parent(0x12) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = accept(r0, &(0x7f0000000200)=@alg, &(0x7f0000000000)=0x80) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x4]}, &(0x7f0000000280)=0x6) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) bind$nfc_llcp(r1, &(0x7f0000000380)={0x27, 0x1, 0x2, 0x7, 0x8c, 0x3, "815008c9815cd6110f89553ed93536827636c3b5ad02f7c3c390476248868d875d25604bc529577d6ec892e6ea81a4ca212763075e6d5379d46b3a06f545db", 0x9}, 0x60) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) migrate_pages(r2, 0xca, &(0x7f0000000300)=0x9, &(0x7f0000000340)=0xfffffffffffffeb4) [ 2875.264373] input: syz1 as /devices/virtual/input/input4768 03:41:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e26, @multicast1}, 0xfffffffffffffe68) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x48003, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000140)={0x8, "eff0671f1fed47f9beb5a67cdf2676d66f2606bd52cd9fe0170e502712597f94", 0x7, 0x42, 0x8000, 0x9, 0x5, 0x4, 0x3, 0x800}) sendmsg$alg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="97160bb440177ad392a640caa1f602bd515070b3921503853456bad8d101d58a7630d4c050fecf5a7f6e8b66e7a3e9d901c86b201fd550a952f5af4204cb3dc2d70354b143200f6f590867606084598657abb6db0cde386bac78bd594b86807a96353b19b6f7a2bc9c281e4e1b82a7429bb0b6220290cd6199ee289a9824a22486ce3654673616416a9dceffeedb79ebf9233b9734a5d3d596ad646802b61900e009790555f7b240bbad9d57b2c8789e929fe1f5cbe78f7326543c6a66bff831376f72bf44df49f9f5772c4be25754c65c16cd26b4f7a5e233bd", 0xda}, {&(0x7f00000002c0)="a76412c9f2ec853834ee53116c1d206a7b8d010c886c6fa25d0286865017dfc3f1f6cdc83baa11244a127994be22c7f3a716edcb1ac4dce5f079c449dfa7d62f27edcc071417a4faaa35dc02928bc028b63ce9249a01e4fe7e80d00f49cf86f24ad5833751c5308df86b74a29df9a78918c5b1e056d24e88dd0ee33d561ab960171989dfd264bf171611569a1c60f8291c2649851e09a30817d9b45388ea46c4a18f80b5", 0xa4}, {&(0x7f0000000380)="babd6508a75482484f805da00263befd4a87d1dcd4f9b5608085fa6576bf6347dc2eed17daa88c1652b9a1552eca218162132b219f2cb53dcec098ae22be06bda9d5ccfc3d0c1a5bf4d26822fdc7ebc800d7767a8799b3f897c42ce67c912f4f39dad81c50d0b44746b6f48a15815c176a2c8ff3857ee895a3c6a0a663b0183146b84cf3eea66f0527bdafac74441bd188fbba38805110ef67d4bf243ef32d1e5c7937f27f15", 0xa6}, {&(0x7f0000000440)="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", 0xfc}], 0x4, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x5f53}, @assoc={0x18}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0x90, 0x881}, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="2ee917085cbe346e5f7107a0770dcf36842c67dbb309e46ccae6c51f8a6ca829cc8f7c56419297318ea33bcc4be1d592b53518811325e1766e9df6", 0x3b}], 0x1) 03:41:09 executing program 2: 03:41:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000500000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000001c0)=""/106) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='dctcp\x00', 0x108) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth1_to_team\x00', 0x9a2e) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x17e) [ 2875.507853] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2875.536093] input: syz1 as /devices/virtual/input/input4770 03:41:10 executing program 2: 03:41:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000200, 0x7) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x6f, 0x20, 0x13eb, 0xfffffffffffffeff, 0xfffffffffffffff9}, 0x14) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000080), &(0x7f0000000100)=0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x3d6) sendto$inet(r0, 0x0, 0xffffffffffffffab, 0x200007fd, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x5c) [ 2875.558712] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2875.573174] input: syz1 as /devices/virtual/input/input4771 03:41:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000800000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:10 executing program 2: 03:41:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x204001, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000140)) 03:41:10 executing program 4: openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200800, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) [ 2875.790579] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2875.810317] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2875.869618] input: syz1 as /devices/virtual/input/input4772 [ 2875.909202] input: syz0 as /devices/virtual/input/input4773 03:41:10 executing program 2: 03:41:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300001000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = getpid() ptrace$getregset(0x4204, r1, 0x201, &(0x7f0000000000)={&(0x7f0000000140)=""/217, 0xd9}) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet(0x2, 0x80004, 0x5) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x4800, 0x0) accept4$ax25(r1, 0x0, &(0x7f0000000180), 0x800) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2876.017395] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2876.044437] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:10 executing program 2: 03:41:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000a001000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0xc, @remote, 0x4e22, 0x3, 'wrr\x00', 0x2, 0x4, 0x10}, {@loopback, 0x4e24, 0x3, 0x5, 0x1, 0x401}}, 0x44) [ 2876.214088] input: syz1 as /devices/virtual/input/input4774 [ 2876.223231] input: syz1 as /devices/virtual/input/input4775 03:41:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt(0xffffffffffffffff, 0x4, 0x8001, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000005b00)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) recvmmsg(r0, &(0x7f0000008780)=[{{&(0x7f0000000800)=@alg, 0x80, 0x0, 0x0, &(0x7f0000002b00)=""/238, 0xee}}, {{0x0, 0x0, &(0x7f00000058c0)}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000008700)=[{&(0x7f0000008680)=""/120, 0x78}], 0x1}}], 0x4, 0x40000000, 0x0) [ 2876.337076] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0xfffffeda) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = semget$private(0x0, 0x0, 0x80) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)=[0x0]) r2 = dup2(r0, r0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000180)={0xf, {0xc92, 0x1f, 0x4, 0x1f}}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:10 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x3, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2876.386405] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2876.402124] IPVS: set_ctl: invalid protocol: 12 172.20.20.187:20002 03:41:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:11 executing program 4: r0 = socket$inet(0x2, 0x400000009, 0x40040) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000005000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2876.429351] IPVS: set_ctl: invalid protocol: 12 172.20.20.187:20002 03:41:11 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000380)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x2, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@obj_type={'obj_type', 0x3d, 'dctcp\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00'}}, {@audit='audit'}, {@fowner_eq={'fowner', 0x3d, r4}}, {@smackfshat={'smackfshat'}}, {@obj_type={'obj_type', 0x3d, 'vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00'}}]}}) r5 = socket$inet(0x2, 0x80007, 0x0) bind$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r5, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r5, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x4, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2876.607792] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2876.618836] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0xfffffffffffffffc) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000340)=""/26, &(0x7f0000000380)=0x1a) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x400000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x210, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd5a}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x40080) [ 2876.762941] input: syz1 as /devices/virtual/input/input4776 [ 2876.791795] input: syz1 as /devices/virtual/input/input4777 03:41:11 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) 03:41:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300004009000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000140)={0x7e, @remote, 0x4e22, 0x3, 'dh\x00', 0x2, 0x5849, 0x7c}, 0x2c) 03:41:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2876.926374] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2876.944984] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x801, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x8, &(0x7f0000000200)=0x4) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000003600), 0x3, 0x1) 03:41:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x5, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)="2e0000003500817ee45de087185082cf0300b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 2877.200998] input: syz1 as /devices/virtual/input/input4778 [ 2877.221066] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:11 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x13, &(0x7f0000000180), &(0x7f0000000200)=0x4) fchmod(r0, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r1, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000020000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:11 executing program 4: r0 = socket$inet(0x2, 0x200000000000843, 0x1) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 2877.253001] input: syz1 as /devices/virtual/input/input4779 [ 2877.263538] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x6, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2877.351172] netlink: 22 bytes leftover after parsing attributes in process `syz-executor2'. [ 2877.377566] netlink: 22 bytes leftover after parsing attributes in process `syz-executor2'. 03:41:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000380)="2e0000003500817ee45de087185082cf0300b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 03:41:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') ioctl$TIOCNXCL(r1, 0x540d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4080, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000140)=""/193) 03:41:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000003f000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2877.505873] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2877.532697] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x7, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2877.661377] netlink: 22 bytes leftover after parsing attributes in process `syz-executor2'. [ 2877.683512] input: syz1 as /devices/virtual/input/input4780 03:41:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='rose0\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2877.727201] input: syz0 as /devices/virtual/input/input4781 [ 2877.757482] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008923, &(0x7f00000002c0)="68436b6172c43a") 03:41:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x60, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2877.786872] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:12 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0xc) 03:41:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000940000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2877.978247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2878.012409] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2878.063407] input: syz1 as /devices/virtual/input/input4782 03:41:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x300, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2878.106916] input: syz1 as /devices/virtual/input/input4783 03:41:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) 03:41:12 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xf3a, 0x2101) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000140)=@ipx={0x4, 0x1950, 0xfffffffffffffff8, "d19174b5807d", 0x2}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="154e76dfe0c3d36cdbf368a9b5bcceaac111f937702499a101dc92540805683125d2c9aa32dd03a42146c3b82194c50e1504915aee69ffff86d89ae8e0c73e70be8e136e62c00e33de8883bb8fc3bd20855250ef2e7fe0124a6ec604552043a1bcf3b1e9d5959ef006", 0x69}, {&(0x7f0000000240)="1b1624eb5f6940e1fef8f5f38caf391a8d6b995f2e763e4e13c34b8a4b6589f3d65b1bcc2a56ffd0f9c37e9e8a60c9d3f6f7a51edb7bdf41fb222fb1dd07022ea5826906f1544f3d9be6817dae0d2dd4540401e6a5e81d25479f8c401c76b31e45c0650845", 0x65}], 0x2, &(0x7f0000000300)=[{0xd8, 0x10a, 0x9, "be0a9f74f8c5bdfe8e2864683226281271cb3a3be5a3ecccd70126b56e42ae4dfe83078fcc42da470566155658cf38995aef428b4ebfbd73dd049ec8b861cf93aa952eaba45026c80e0d3be295a0134c35d3ec7c767f5d83b86bf00aab92bbbe1332095af5eec0891878c9c2472cea85aad2fe84252626bf7684e2a0c2d45123afe96d4023159f19aa8bc636812e3d37c7b4e064568f04e1da2618ec0dfbc4840b28bf407eae3c1f315c5176ece4dfcdd28dc7dc8aa411ac8340293105b645c109f48cdd41"}, {0x108, 0x1ff, 0xbee9, "73e9c2912c57aec21aed33b79fadb1c07fd36a0d7547b302a5816a035590a0e5a37854e6e355ef42455ae718f78c90ddb3e0526374e3a43d0541690747fa6b4b97298d3e921d2502c5f7a318d3fa86dca9abbb1dea19b26b284e2bb0ea8d7aa40462f13ec2056eeadb901e6899b973089466291c6c4724a215018ca6c7e80a3398128778da97c347c1194195871ca0e19377d19d82a833afb8466265144f93dbec6aa3410760cf1fa0cfa658db13e84dfa0407e993e360d5096b8a0df159aa7e395a86c3b24b8da3c9d637439ff8dab22d00c1e2e47f475eb0c51c5849193ec3d1d89da51f30e22911d5c4a60c434c56f0f907"}, {0x40, 0x3f9bd51f71bdbc91, 0x4, "79df2e31b6da94782aefad5dba1596b4fa7aa55dbe582f1c5e2bad7f084adc8a0c1b0061d2620268d363"}, {0x48, 0xba, 0x80000000, "6ea054cc38314333c3b7e6dc84d915e1126d0407d93760ac65d5e62bd825b06d44fa2d04f39d2581daecdb2ce647a19e67c8"}], 0x268}, 0x4000) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000600)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, r1, 0x922, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000700)='/dev/dsp#\x00', 0x83b9, 0x100000c0800) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000040)=0xffff, 0x4) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000000)={0x0, 0x2, 0x3, 0x1ff, 0x4}) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) lsetxattr$security_smack_transmute(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='security.SMACK64TRANSMUTE\x00', &(0x7f00000007c0)='TRUE', 0x4, 0x1) sendto$inet(r2, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000040030000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @rand_addr=0x9}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = dup3(r0, r0, 0x80000) write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1, 0xff}, 0xb) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000240)={r0, r0, 0x9, 0x30, &(0x7f0000000200)="3c1b42a15d0d6701e76745f044ecb5ebb30e7f9c0755bbbc1bd2c0317aeeadb1ee6f73e0023106f448112a0256c18f92", 0xfd, 0x1, 0x4e31, 0xd6, 0xfffffffeffffffff, 0x2, 0x8001, 'syz0\x00'}) r2 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r2) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2878.295846] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2878.330116] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000000, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x2fc) sendto$inet(r0, 0x0, 0x55, 0x200007f9, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000200)='\x00', 0x1, 0x3) 03:41:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x500, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000003400000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0xa0c0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e22, 0x8000, @local, 0x2}}, 0x7, 0xfff}, &(0x7f0000000400)=0x90) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f0000000200)=0x100000001) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2878.398217] input: syz1 as /devices/virtual/input/input4784 [ 2878.435256] input: syz1 as /devices/virtual/input/input4785 03:41:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2878.594274] input: syz1 as /devices/virtual/input/input4786 [ 2878.612861] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2878.637331] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x8, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r1, 0x81}, 0x8) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 03:41:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x600, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x28100, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000200)=0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000a000800000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2878.805421] input: syz1 as /devices/virtual/input/input4787 [ 2878.831370] input: syz0 as /devices/virtual/input/input4788 03:41:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) read(r0, &(0x7f0000000140)=""/4096, 0x1000) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x4) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) [ 2878.906053] input: syz1 as /devices/virtual/input/input4789 [ 2878.933206] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:13 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000003c0)='dctcp\x00', 0x1) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/cachefiles\x00', 0x88800, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001b00)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000001c80)={&(0x7f0000001ac0), 0xc, &(0x7f0000001c40)={&(0x7f0000000440)=ANY=[@ANYBLOB="000037d9a378dc5fd1c862bed5a0e0dde9db3e84504d2e1b6bd204467cf5cde4af451d9a3db017619c36cfc2a59edd44cfb6ef2b97d7074f5e33", @ANYRES16=r2, @ANYBLOB="000427bd7000fcdbdf251100000038000100080002000000000008000800080000000c0007000200000018000000080004004e2000000800050004000000080001000a00000008000400090000003c00030014000600ff010000000000000000000000000001080008000400000008000300000000001400020064756d6d793000000000000000000000540002000800050000f8ffff08000b0000000000080004000000010008000700d600000008000b000a000000080004000100008008000600060000000800040001000000080007000900000008000300040000000c000300080007004e200000"], 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x80) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000400)='\x00', 0xfffffffffffffc45, 0x891, 0x0, 0xdb) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x4, 0xaa, [], 0x9, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/170}, &(0x7f0000000380)=0x78) 03:41:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') ioctl$TIOCNXCL(r1, 0x540d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2878.968093] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x700, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000100001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1ff, 0x1, 0x1000, 0xffffffff, 0x54d, 0x8b1, 0x5, 0xebc0}, &(0x7f0000000040)={0x8, 0x5f, 0xf59, 0x9, 0x61800000000000, 0x1, 0x40, 0x101}, &(0x7f0000000080)={0x400, 0xde, 0xfff, 0x100, 0x1, 0xffff, 0x9, 0xffffffffffff0001}, &(0x7f0000000180)={r1, r2+10000000}, &(0x7f0000000200)={&(0x7f00000001c0)={0x7}, 0x8}) 03:41:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') ioctl$TIOCNXCL(r1, 0x540d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2879.157020] input: syz1 as /devices/virtual/input/input4790 [ 2879.178461] input: syz1 as /devices/virtual/input/input4791 [ 2879.235392] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2879.264506] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x2000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200000, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x40, 0x4000) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r2) 03:41:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000200001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') ioctl$TIOCNXCL(r1, 0x540d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2879.506949] input: syz1 as /devices/virtual/input/input4792 [ 2879.520872] input: syz1 as /devices/virtual/input/input4793 [ 2879.548668] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x6424215babc76fb1, 0x200007ed, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x50) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000340)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)=0x0) ptrace$getregs(0xc, r3, 0x277339bc, &(0x7f0000000180)=""/196) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000100)={0x9, 0x5, {0x56, 0x1, 0x3, {0x81}, {0x8, 0xfffffffffffffbff}, @const={0x400, {0x7, 0x200, 0xac, 0x8000}}}, {0x55, 0x4000000080000000, 0x1, {0x6, 0x1}, {0x8, 0x2}, @period={0x5a, 0x2, 0xffffffffffffff01, 0xd90d, 0x100000001, {0x1, 0x140000, 0x5, 0x8}, 0x0, &(0x7f0000000080)}}}) [ 2879.595105] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:14 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000740)='./file0\x00', 0x3ff, 0x9, &(0x7f0000000640)=[{&(0x7f0000000880)="c3fb130e955b9be1f612079b4f2986f6a713e567a4036cb97730a45d8315088f1611e9a098225048b6bcee3c80f0cecf8ce8b7d361389dbf0453224cff954575e81fded95f33cc9588075a9472d87d01f72dd6a27a5514d493364eab6956a7e178b843af28a98963e7086ac77113132dd7644ce6a0a498ca8c821e24524e730b6a52a3cb8c5afb776396558a2e499d81eebd43965e3c9fdf2832232a0899653b30dc27e3b435c9f1be9f8fe7d766d7f4cf880447a76c4ed055da2366", 0xbc, 0xca30}, {&(0x7f00000002c0)="aac3d8b73086ccbcfc710d0aa6e50733404f83c559c851ffb46ebae56ffa8791c2eb69ba0f375172a8fcf4d5e327c8871d705bf219983a024fc71f63aeea9bff8faa44c3b3636b1f195029f42b7eedf84374fa8d44cb983f002b98f262208ef5fd7aae83c89f9f5f3c1b89fc6566d222150b6f6f3695ecb2140b5e76ede07e8dba3c589063c6a6d37ff71ccb976ff37e61c1aea4feb28570c79fdc4e705b82bd63b22c785adb33357f928ba44dde6bb791061a4421c26eea2089545369188b212d9d6cc46c2ac5df25b815546b7305ca4d523a3b4775a2b7e5e8", 0xda, 0xffffffff}, {&(0x7f00000003c0)="50dfdaa829e9108417081af904f4595762f50bfa721a98b66291cc0045fc1068897581", 0x23}, {&(0x7f0000000400), 0x0, 0xcacf}, {&(0x7f0000000980)="b9a91fb710df18ad4ccaeed1ebb895b3313db77c7ce159aa3913a97d9b7a3e6bfbdf5bd770566200e12921b1e7c66cbf3bdf6c941f0237b3b8f4cdbcfcf972fae2c6282340ababcd4155e229eb0ff9d0cef381ae08e1df09495662c8cfc224c62dd242496473f43776668c7abd1900000000000000", 0x43e, 0x6}, {&(0x7f00000004c0)="f7e36e62967b0a2a61f30ad47573c849f328397b18da8543f374c73b3593568afc70e3c34b917c2c3d702fb46d4df556c412903e76084028b4a1b54a2681bfb8c302703ac74497eeb39f3f9b5255adcfae1ff3a3ae12bee9d1abb4a16fa265cfba358189a1a253343f", 0xfffffffffffffcf4, 0x2}, {&(0x7f0000000540)="d4081e1f497ee59c033664b3d27e2e8ddbc3f4003aeb222792db4b0ed7b1", 0x1e, 0x7}, {&(0x7f0000000580)="76ecb5154c7ff8d67fee19d9841ed1e30d659b30b2ab4a68d9a390550252323a84e3a37fdca53255bc4d874205c24086546f70b61f4669ffb723c4a6cef4b0295b4062e101a63a3149ee7d08fddebdb8114737c949b689183cfc589cc466df725b615de4", 0x64, 0x200}, {&(0x7f0000000940)="826f2687780747a2783ed3b8dccecc620388b3bf70364eec4e486f010d158b6739a6b0cce864816ac5b5e4171f2a9ccf20dfdd8ee1920f9244bfddb58ebd", 0x3d, 0xb7}], 0x10, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000400)='ip_vti0\x00', 0xc0) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') ioctl$TIOCNXCL(r1, 0x540d) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x6000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000400001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000200)=&(0x7f0000000080)) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000140)={{0x8, 0xfffffffffffeffff}, 'port0\x00', 0xd5, 0x10000, 0x4, 0x41, 0x7f, 0x40, 0x3, 0x0, 0x1, 0xf32}) [ 2880.017760] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2880.032690] input: syz1 as /devices/virtual/input/input4794 03:41:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x3500000000000000) 03:41:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000b80)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xffffffffffffff0e) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73650275726974792e926574683100000000396cde60ffef00"]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000200)=""/125) [ 2880.060072] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0xff00, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000500001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) r2 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) prlimit64(0x0, 0x6, &(0x7f0000000100), 0x0) setresuid(r3, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r5 = dup(r4) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r4, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) [ 2880.319602] input: syz1 as /devices/virtual/input/input4796 [ 2880.340279] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2880.381426] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2880.393906] input: syz1 as /devices/virtual/input/input4797 [ 2880.455502] input: syz1 as /devices/virtual/input/input4798 [ 2880.619473] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 03:41:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0xfe91) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x2, 0x9, 0x6, 0x9, 0x7fffffff, 0x2, 0x6, {0x0, @in6={{0xa, 0x4e22, 0x2, @mcast1, 0xd4}}, 0x10001, 0xda, 0x8, 0x4, 0x81}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e21, @loopback}}, 0x6, 0x400, 0x5, 0xff, 0x1ff}, &(0x7f0000000180)=0x98) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0xfffffe25) 03:41:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000800001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x1000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r0, r0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000000)={0x5, 0x1}) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x58e, 0x0, &(0x7f0000000c80), 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) fsetxattr$security_capability(r1, &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000b40)=@v1={0x1000000, [{0x7, 0x3f09}]}, 0xc, 0x1) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="73656375726974792e766574683100000000ffffffcbd066bc0ab9a1bcd932410f2d0f37ffffef00"]) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x10, 0x0, 0x0) [ 2880.972755] input: syz1 as /devices/virtual/input/input4799 [ 2880.995538] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2881.016568] input: syz1 as /devices/virtual/input/input4801 [ 2881.025314] input: syz1 as /devices/virtual/input/input4800 [ 2881.038447] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x2000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = dup(r3) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) ftruncate(r1, 0x5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffe7b, 0x200007fd, &(0x7f0000000080)={0x2, 0x40004e23, @remote}, 0x7585013d) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000002c0)=0x100000001, 0x4) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x100f, 0x4}, {0x81, 0x7}]}, 0x14, 0x3) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000240)={'bond_slave_0\x00', 0x2}) r2 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="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", 0x1000, 0xfffffffffffffffc) keyctl$get_security(0x11, r2, &(0x7f0000001380)=""/4096, 0x1000) sendto(r0, &(0x7f0000002380)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000400900001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2881.262545] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0x60, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x1000]}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000b80), 0x4) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfe3a) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000200)=0x0) syz_open_dev$swradio(&(0x7f0000000bc0)='/dev/swradio#\x00', 0x1, 0x2) r5 = syz_open_procfs(r4, &(0x7f0000001180)='stat\xfbs\x00!v\xe0\x11\xf9m&U\xc9\xb8\xa5\xf1\xcdG\xc7\xd2\x84\x81\x17\x1f\f\xf0n\"\x1cY\a\xf7\xcd\x91\x03\xfbm\x0e\x05\r\xe3 \n6C6j\xb3\xdeeX\xe0.s\xe9\xa2\xba|V7.\x14)\xef\xa0VXU\xd3\xd4\xd8\xac\xa3\x0ejl\xcaZR\xb0\x97f\xef\n%\xa9\x93\xa3! \xf1x\xaf\xe2|\xa3hzJ\"\xed\x1c\xf9S\x9f\x1f+\xd5,|\x9aJ\xa6\xc2@\xe7\n\x05\xb5N\xc7\xb8\xb2Rfol\v\\\x15\xafv(\xed\"\xbdU>\x83p9\xf0\x15X\x82b\xd3\x9en\x7f\xbbQ\\\xef\v\xd3\xa1\xc3j\x17\xcc\xe7\xeb=\xfa\xa1]\x1a~?\xf3J\x14\xa6_\x88\xad7\v\x88\xb9L\xb1\x0e\xb1\x9c\xe9\x9f\x15\xe7\x1c\xfdI\x171F\x94\x1a9q\x8d\xb1N\xab\xd7\xc4\x97LY\xf0\x03\xd4\xaa\xc3\x91s\x85@\x91\x88A!\xefm|\x04\xab~\xd3\x0e\xb3\xe8\xad\xac\xe6kq*)g1\xf6\x9e\xbb\xce\xe98\xd8\xbb(\xcc\xdb\x1e`|\x80\x8aas \x1fH\xce\xacUXR:v4\v\xb2A \xec\x7f\xb8X\x19<') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180008000303000000000300000000000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2881.321289] input: syz1 as /devices/virtual/input/input4802 [ 2881.346372] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00') setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x3000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2881.380686] input: syz0 as /devices/virtual/input/input4803 03:41:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000001000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x200000000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='\x00', 0x2) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6b7ef31d26370658556d2542434f59caaf75c4b85d8a6ac806249db614"], 0x1}}, 0x44801) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x1, &(0x7f0000000c80)=[{&(0x7f0000000c00)="215c304bdd20751b4426a752fc45f039267482f0eb4df23f2c4ba8b97e569437de83278e4ff55abb8f5fea5340bc67add01a5731851db26b7eb2762947a6448a782eff6e67d9397cb5ed4bb558aefcefbfe22eb9ce6a1c6f9308b05b10246ccf", 0xfffffffffffffdef, 0x6}], 0x440, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57dac08e14"]]], 0x1}}, 0x40002) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r3 = dup(r2) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) socket$inet(0x2, 0x7, 0x85) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x4, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x4486, 0x3382, 0x0, 0x0, 0xf5, 0x4, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0xff, 0x4000000000, 0x0, 0x0, 0xb5, 0x6ef5, 0x9, 0x9, 0xd3a, 0x4, 0x0, 0x1, 0x6, 0x40, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x9e7a, 0xe398, 0x401, 0x0, 0x5, 0x8, 0x100000000, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x1, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x4, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x7f, 0x3, 0x8, 0x400, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x20, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x88f4, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x6b52, 0x3f, 0x888, 0x1, 0x7, 0xffffffff, 0xfffffffffffffffb, 0x2, 0x80000000, 0x1, 0x3, 0x8, 0xff, 0x9, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x3, 0x3], {0x0, 0x989680}}) 03:41:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='nv\x00', 0x18b) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='bcsh0\x00', 0xfffffe91) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:16 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2881.642836] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2881.698943] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2881.724922] input: syz1 as /devices/virtual/input/input4804 03:41:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x4000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000002000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000200)={{0x6, 0x0, 0x2, 0x5}, 0x2, 0x20, 0xff, r2, 0x6, 0x0, 'syz1\x00', &(0x7f0000000140)=['illinois\x00', 'illinois\x00', 'illinois\x00', 'vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 'nv\x00', 'nv\x00'], 0x2f, [], [0x4, 0x9, 0x5, 0x401]}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2881.939717] FAULT_INJECTION: forcing a failure. [ 2881.939717] name failslab, interval 1, probability 0, space 0, times 0 [ 2882.019486] CPU: 0 PID: 27922 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2882.026733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2882.036116] Call Trace: [ 2882.038730] dump_stack+0x1db/0x2d0 [ 2882.042385] ? dump_stack_print_info.cold+0x20/0x20 [ 2882.047438] should_fail.cold+0xa/0x15 [ 2882.051509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2882.056726] ? ___might_sleep+0x1e7/0x310 [ 2882.060894] ? arch_local_save_flags+0x50/0x50 [ 2882.065497] __should_failslab+0x121/0x190 [ 2882.069757] should_failslab+0x9/0x14 [ 2882.073713] kmem_cache_alloc_trace+0x2d1/0x760 [ 2882.078397] ? __fget+0x472/0x710 [ 2882.081871] loop_add+0xa0/0xa30 [ 2882.085250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2882.090799] ? loop_lookup+0x107/0x230 [ 2882.094868] ? loop_queue_rq+0x730/0x730 [ 2882.098968] ? rcu_read_unlock_special+0x380/0x380 [ 2882.103927] loop_control_ioctl+0x286/0x470 [ 2882.108259] ? loop_add+0xa30/0xa30 [ 2882.111909] ? iterate_fd+0x4b0/0x4b0 [ 2882.115723] ? loop_add+0xa30/0xa30 [ 2882.119368] do_vfs_ioctl+0x107b/0x17d0 [ 2882.123910] ? memset+0x32/0x40 [ 2882.127203] ? ioctl_preallocate+0x2f0/0x2f0 [ 2882.131624] ? smack_inode_setattr+0x290/0x290 [ 2882.136219] ? __fget_light+0x2db/0x420 [ 2882.140213] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2882.145765] ? fput+0x128/0x1a0 [ 2882.149052] ? do_syscall_64+0x8c/0x800 [ 2882.153046] ? do_syscall_64+0x8c/0x800 [ 2882.157043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2882.162600] ? security_file_ioctl+0x93/0xc0 [ 2882.167038] ksys_ioctl+0xab/0xd0 [ 2882.170501] __x64_sys_ioctl+0x73/0xb0 [ 2882.174407] do_syscall_64+0x1a3/0x800 [ 2882.178310] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2882.183256] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2882.188278] ? __switch_to_asm+0x34/0x70 [ 2882.192336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2882.197194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2882.202480] RIP: 0033:0x457ec9 03:41:16 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2882.205680] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2882.224591] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2882.232313] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2882.239677] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2882.246953] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2882.254249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2882.261548] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:16 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000003f00001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2882.351344] input: syz1 as /devices/virtual/input/input4806 [ 2882.387956] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2882.417524] FAULT_INJECTION: forcing a failure. [ 2882.417524] name failslab, interval 1, probability 0, space 0, times 0 [ 2882.421105] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2882.437955] CPU: 0 PID: 27936 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #27 [ 2882.445166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2882.445173] Call Trace: [ 2882.445198] dump_stack+0x1db/0x2d0 [ 2882.445218] ? dump_stack_print_info.cold+0x20/0x20 [ 2882.445235] ? mark_held_locks+0x100/0x100 [ 2882.445251] ? print_usage_bug+0xd0/0xd0 [ 2882.445275] should_fail.cold+0xa/0x15 [ 2882.445297] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2882.445322] ? ___might_sleep+0x1e7/0x310 [ 2882.466167] ? arch_local_save_flags+0x50/0x50 [ 2882.466200] __should_failslab+0x121/0x190 [ 2882.474479] should_failslab+0x9/0x14 [ 2882.474497] kmem_cache_alloc_trace+0x2d1/0x760 [ 2882.474519] ? debug_smp_processor_id+0x1c/0x20 [ 2882.474533] ? perf_trace_lock+0x12f/0x750 [ 2882.474557] tcp_sendmsg_locked+0x275f/0x3e80 [ 2882.474570] ? add_lock_to_list.isra.0+0x450/0x450 [ 2882.474587] ? print_usage_bug+0xd0/0xd0 [ 2882.474611] ? lock_sock_nested+0xac/0x120 [ 2882.483586] ? tcp_sendpage+0x60/0x60 [ 2882.483602] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2882.483620] ? trace_hardirqs_on+0xbd/0x310 [ 2882.483637] ? lock_sock_nested+0xe2/0x120 [ 2882.483651] ? trace_hardirqs_off_caller+0x300/0x300 [ 2882.483667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2882.483682] ? check_preemption_disabled+0x48/0x290 03:41:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x5000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2882.483707] ? lock_sock_nested+0x9a/0x120 [ 2882.509868] ? __local_bh_enable_ip+0x15a/0x270 [ 2882.509897] tcp_sendmsg+0x30/0x50 [ 2882.509916] inet_sendmsg+0x1af/0x740 [ 2882.509933] ? ipip_gro_receive+0x100/0x100 [ 2882.509948] ? smack_socket_sendmsg+0x157/0x1a0 [ 2882.509969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2882.509983] ? security_socket_sendmsg+0x93/0xc0 [ 2882.509999] ? ipip_gro_receive+0x100/0x100 [ 2882.510018] sock_sendmsg+0xdd/0x130 [ 2882.535744] __sys_sendto+0x387/0x5f0 [ 2882.535769] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2882.535785] ? wait_for_completion+0x810/0x810 [ 2882.535820] ? __sb_end_write+0xd9/0x110 [ 2882.535841] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2882.535856] ? fput+0x128/0x1a0 [ 2882.554166] ? do_syscall_64+0x8c/0x800 [ 2882.554181] ? do_syscall_64+0x8c/0x800 [ 2882.554198] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2882.554217] ? trace_hardirqs_on+0xbd/0x310 [ 2882.554233] ? __ia32_sys_read+0xb0/0xb0 [ 2882.554251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2882.554266] ? trace_hardirqs_off_caller+0x300/0x300 03:41:17 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2882.554287] __x64_sys_sendto+0xe1/0x1a0 [ 2882.554306] do_syscall_64+0x1a3/0x800 [ 2882.569085] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2882.569105] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2882.569127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2882.569153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2882.585424] RIP: 0033:0x457ec9 [ 2882.585439] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2882.585447] RSP: 002b:00007f7a103a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2882.585461] RAX: ffffffffffffffda RBX: 00007f7a103a7c90 RCX: 0000000000457ec9 [ 2882.585470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2882.585479] RBP: 000000000073bf00 R08: 00000000200008c0 R09: 0000000000000010 [ 2882.585489] R10: 00000000200007fd R11: 0000000000000246 R12: 00007f7a103a86d4 [ 2882.585498] R13: 00000000004c54a0 R14: 00000000004d9140 R15: 0000000000000004 [ 2882.805866] FAULT_INJECTION: forcing a failure. [ 2882.805866] name failslab, interval 1, probability 0, space 0, times 0 [ 2882.836398] CPU: 0 PID: 27940 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2882.843644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2882.853023] Call Trace: [ 2882.855635] dump_stack+0x1db/0x2d0 [ 2882.859260] ? dump_stack_print_info.cold+0x20/0x20 [ 2882.864304] should_fail.cold+0xa/0x15 [ 2882.868221] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2882.873352] ? ___might_sleep+0x1e7/0x310 [ 2882.877517] ? arch_local_save_flags+0x50/0x50 [ 2882.882122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2882.887698] __should_failslab+0x121/0x190 [ 2882.891949] should_failslab+0x9/0x14 [ 2882.895770] kmem_cache_alloc_node_trace+0x270/0x720 [ 2882.900890] ? idr_alloc_u32+0x27e/0x3a0 [ 2882.904995] __kmalloc_node+0x3d/0x70 [ 2882.908816] blk_mq_alloc_tag_set+0x3b1/0xf00 [ 2882.913422] ? idr_alloc+0x14a/0x1b0 [ 2882.917157] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2882.922355] ? __fget+0x472/0x710 [ 2882.925833] loop_add+0x2dc/0xa30 [ 2882.929291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2882.934845] ? loop_queue_rq+0x730/0x730 [ 2882.938911] ? rcu_read_unlock_special+0x380/0x380 [ 2882.943873] loop_control_ioctl+0x286/0x470 [ 2882.948206] ? loop_add+0xa30/0xa30 [ 2882.951855] ? iterate_fd+0x4b0/0x4b0 [ 2882.957207] ? loop_add+0xa30/0xa30 [ 2882.960857] do_vfs_ioctl+0x107b/0x17d0 [ 2882.964854] ? memset+0x32/0x40 [ 2882.968145] ? ioctl_preallocate+0x2f0/0x2f0 [ 2882.972571] ? smack_inode_setattr+0x290/0x290 [ 2882.977168] ? __fget_light+0x2db/0x420 [ 2882.981172] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2882.986741] ? fput+0x128/0x1a0 [ 2882.990029] ? do_syscall_64+0x8c/0x800 [ 2882.994014] ? do_syscall_64+0x8c/0x800 [ 2882.998013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.003565] ? security_file_ioctl+0x93/0xc0 [ 2883.007997] ksys_ioctl+0xab/0xd0 [ 2883.011472] __x64_sys_ioctl+0x73/0xb0 [ 2883.015383] do_syscall_64+0x1a3/0x800 [ 2883.015611] FAULT_INJECTION: forcing a failure. [ 2883.015611] name failslab, interval 1, probability 0, space 0, times 0 [ 2883.019279] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2883.019297] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2883.019318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2883.045377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2883.050585] RIP: 0033:0x457ec9 [ 2883.053793] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2883.072705] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2883.080433] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2883.087835] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2883.095673] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2883.102952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2883.110236] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2883.117676] CPU: 1 PID: 27946 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #27 [ 2883.125395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2883.134762] Call Trace: [ 2883.137366] dump_stack+0x1db/0x2d0 [ 2883.141008] ? dump_stack_print_info.cold+0x20/0x20 [ 2883.146052] should_fail.cold+0xa/0x15 [ 2883.149956] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2883.155073] ? add_lock_to_list.isra.0+0x450/0x450 [ 2883.160018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.160039] ? check_preemption_disabled+0x48/0x290 [ 2883.160066] ? __lock_is_held+0xb6/0x140 [ 2883.160086] __should_failslab+0x121/0x190 [ 2883.160104] should_failslab+0x9/0x14 [ 2883.170655] kmem_cache_alloc+0x47/0x710 [ 2883.170677] ? find_exception+0x3d8/0xb90 [ 2883.170701] dst_alloc+0x10e/0x1d0 [ 2883.170717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.200028] rt_dst_alloc+0xf6/0x510 [ 2883.203757] ? fnhe_flush_routes+0x450/0x450 [ 2883.208173] ? __lock_is_held+0xb6/0x140 [ 2883.212261] ip_route_output_key_hash_rcu+0xa32/0x3470 [ 2883.217558] ? ip_route_input_noref+0x280/0x280 [ 2883.222238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.227783] ? check_preemption_disabled+0x48/0x290 [ 2883.232815] ? kasan_check_read+0x11/0x20 [ 2883.236975] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2883.242261] ? rcu_softirq_qs+0x20/0x20 [ 2883.246369] ip_route_output_key_hash+0x25d/0x400 [ 2883.251229] ? ip_route_output_key_hash_rcu+0x3470/0x3470 [ 2883.256795] tcp_v4_connect+0x7e8/0x1da0 [ 2883.260886] ? tcp_v4_parse_md5_keys+0x360/0x360 [ 2883.265668] __inet_stream_connect+0x9a3/0x11b0 [ 2883.270345] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2883.275021] ? tcp_req_err+0x510/0x510 [ 2883.278916] ? inet_dgram_connect+0x2e0/0x2e0 [ 2883.283426] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2883.288115] ? rcu_read_lock_sched_held+0x110/0x130 [ 2883.293146] ? kmem_cache_alloc_trace+0x354/0x760 [ 2883.298013] ? debug_smp_processor_id+0x1c/0x20 [ 2883.302687] ? perf_trace_lock+0x12f/0x750 [ 2883.306939] tcp_sendmsg_locked+0x28d5/0x3e80 [ 2883.311443] ? add_lock_to_list.isra.0+0x450/0x450 [ 2883.316381] ? print_usage_bug+0xd0/0xd0 [ 2883.320460] ? lock_sock_nested+0xac/0x120 [ 2883.324720] ? tcp_sendpage+0x60/0x60 [ 2883.328542] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2883.333134] ? trace_hardirqs_on+0xbd/0x310 [ 2883.337460] ? lock_sock_nested+0xe2/0x120 [ 2883.341702] ? trace_hardirqs_off_caller+0x300/0x300 [ 2883.346812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.352363] ? check_preemption_disabled+0x48/0x290 [ 2883.357397] ? lock_sock_nested+0x9a/0x120 [ 2883.361649] ? __local_bh_enable_ip+0x15a/0x270 [ 2883.366339] tcp_sendmsg+0x30/0x50 [ 2883.369889] inet_sendmsg+0x1af/0x740 [ 2883.373703] ? ipip_gro_receive+0x100/0x100 [ 2883.378034] ? smack_socket_sendmsg+0x157/0x1a0 [ 2883.382711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.388254] ? security_socket_sendmsg+0x93/0xc0 [ 2883.393015] ? ipip_gro_receive+0x100/0x100 [ 2883.397349] sock_sendmsg+0xdd/0x130 [ 2883.401073] __sys_sendto+0x387/0x5f0 [ 2883.404890] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2883.409568] ? wait_for_completion+0x810/0x810 [ 2883.414178] ? __sb_end_write+0xd9/0x110 [ 2883.418252] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2883.423795] ? fput+0x128/0x1a0 [ 2883.427084] ? do_syscall_64+0x8c/0x800 [ 2883.431064] ? do_syscall_64+0x8c/0x800 [ 2883.435058] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2883.439658] ? trace_hardirqs_on+0xbd/0x310 [ 2883.443987] ? __ia32_sys_read+0xb0/0xb0 [ 2883.448078] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2883.453451] ? trace_hardirqs_off_caller+0x300/0x300 [ 2883.458566] __x64_sys_sendto+0xe1/0x1a0 [ 2883.462648] do_syscall_64+0x1a3/0x800 [ 2883.466545] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2883.471492] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2883.476524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2883.481388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2883.486587] RIP: 0033:0x457ec9 [ 2883.489791] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:41:18 executing program 4 (fault-call:2 fault-nth:2): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2883.508696] RSP: 002b:00007f7a103a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2883.516431] RAX: ffffffffffffffda RBX: 00007f7a103a7c90 RCX: 0000000000457ec9 [ 2883.523735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2883.531704] RBP: 000000000073bf00 R08: 00000000200008c0 R09: 0000000000000010 [ 2883.538979] R10: 00000000200007fd R11: 0000000000000246 R12: 00007f7a103a86d4 [ 2883.546258] R13: 00000000004c54a0 R14: 00000000004d9140 R15: 0000000000000004 03:41:18 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x10000}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000240)={r2, 0x3, 0xb3, "5bfaa04178c565195c342ccb7c520ffcb98c689d1f1ad62d55b5a89d6c3e9dc52328bb4a19009820be4b6822743305cdd9a4a6308ca0b9bb803971758713d10e6f4e1cd1da04ddf660aeb2807e39ee20ce970af0f18440017f463169bdc61424b0c1e4b03f09dddebbd9453e380781e2163cba41191367226c0cf4c2eab7fb46cff9add76064ce08ddd59b43fa5d83b05ee52c368f539a248a2ad893e99875926d324fbb46eafd61f59c1ee379e1658e4daec3"}, 0xbb) [ 2883.614382] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2883.631109] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000008000a000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x6000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2883.657942] input: syz1 as /devices/virtual/input/input4808 [ 2883.689376] FAULT_INJECTION: forcing a failure. [ 2883.689376] name failslab, interval 1, probability 0, space 0, times 0 [ 2883.722623] input: syz1 as /devices/virtual/input/input4809 [ 2883.730966] CPU: 1 PID: 27955 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2883.731327] FAULT_INJECTION: forcing a failure. [ 2883.731327] name failslab, interval 1, probability 0, space 0, times 0 [ 2883.738180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2883.738188] Call Trace: [ 2883.738213] dump_stack+0x1db/0x2d0 [ 2883.738233] ? dump_stack_print_info.cold+0x20/0x20 [ 2883.738250] ? save_stack+0x45/0xd0 [ 2883.738265] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2883.738279] ? kasan_kmalloc+0x9/0x10 [ 2883.738299] ? blk_mq_alloc_tag_set+0x3b1/0xf00 [ 2883.759015] should_fail.cold+0xa/0x15 [ 2883.759036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2883.759059] ? ___might_sleep+0x1e7/0x310 [ 2883.800987] ? arch_local_save_flags+0x50/0x50 [ 2883.805597] __should_failslab+0x121/0x190 [ 2883.809844] should_failslab+0x9/0x14 [ 2883.813739] kmem_cache_alloc_node_trace+0x270/0x720 [ 2883.818848] ? kasan_unpoison_shadow+0x35/0x50 [ 2883.823435] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2883.828561] __kmalloc_node+0x3d/0x70 [ 2883.832381] blk_mq_alloc_tag_set+0x521/0xf00 [ 2883.836909] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2883.842106] ? __fget+0x472/0x710 [ 2883.845587] loop_add+0x2dc/0xa30 [ 2883.849044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.854595] ? loop_queue_rq+0x730/0x730 [ 2883.858663] ? rcu_read_unlock_special+0x380/0x380 [ 2883.863783] loop_control_ioctl+0x286/0x470 [ 2883.868111] ? loop_add+0xa30/0xa30 [ 2883.871753] ? iterate_fd+0x4b0/0x4b0 [ 2883.875561] ? loop_add+0xa30/0xa30 [ 2883.879196] do_vfs_ioctl+0x107b/0x17d0 [ 2883.883179] ? memset+0x32/0x40 [ 2883.886463] ? ioctl_preallocate+0x2f0/0x2f0 [ 2883.890876] ? smack_inode_setattr+0x290/0x290 [ 2883.895475] ? __fget_light+0x2db/0x420 [ 2883.899464] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2883.905027] ? fput+0x128/0x1a0 [ 2883.908311] ? do_syscall_64+0x8c/0x800 [ 2883.912291] ? do_syscall_64+0x8c/0x800 [ 2883.916270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2883.921814] ? security_file_ioctl+0x93/0xc0 [ 2883.926232] ksys_ioctl+0xab/0xd0 [ 2883.929698] __x64_sys_ioctl+0x73/0xb0 [ 2883.933686] do_syscall_64+0x1a3/0x800 [ 2883.937594] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2883.942532] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2883.947563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2883.952427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2883.957618] RIP: 0033:0x457ec9 [ 2883.960815] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2883.979715] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2883.987425] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2883.994693] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2884.001964] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2884.009235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2884.016506] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2884.023880] CPU: 0 PID: 27959 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #27 [ 2884.031084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2884.040452] Call Trace: [ 2884.043077] dump_stack+0x1db/0x2d0 [ 2884.046722] ? dump_stack_print_info.cold+0x20/0x20 [ 2884.051771] should_fail.cold+0xa/0x15 [ 2884.055686] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2884.060811] ? add_lock_to_list.isra.0+0x450/0x450 [ 2884.065767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.071322] ? check_preemption_disabled+0x48/0x290 [ 2884.076359] ? __lock_is_held+0xb6/0x140 [ 2884.080439] __should_failslab+0x121/0x190 [ 2884.084682] should_failslab+0x9/0x14 [ 2884.088494] kmem_cache_alloc+0x47/0x710 [ 2884.092578] ? find_exception+0x3d8/0xb90 [ 2884.096747] dst_alloc+0x10e/0x1d0 [ 2884.100296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.105867] rt_dst_alloc+0xf6/0x510 [ 2884.109609] ? fnhe_flush_routes+0x450/0x450 [ 2884.114031] ? __lock_is_held+0xb6/0x140 [ 2884.118129] ip_route_output_key_hash_rcu+0xa32/0x3470 [ 2884.123993] ? ip_route_input_noref+0x280/0x280 [ 2884.128674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.134224] ? check_preemption_disabled+0x48/0x290 [ 2884.139277] ? kasan_check_read+0x11/0x20 [ 2884.143432] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2884.148720] ? rcu_softirq_qs+0x20/0x20 [ 2884.152728] ? kasan_check_read+0x11/0x20 [ 2884.156992] ip_route_output_key_hash+0x25d/0x400 [ 2884.161849] ? ip_route_output_key_hash_rcu+0x3470/0x3470 [ 2884.161865] ? ip_route_output_key_hash+0x2b9/0x400 [ 2884.161897] ip_route_output_flow+0x28/0xc0 [ 2884.161918] tcp_v4_connect+0x8a3/0x1da0 [ 2884.180839] ? tcp_v4_parse_md5_keys+0x360/0x360 [ 2884.180868] __inet_stream_connect+0x9a3/0x11b0 [ 2884.180886] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2884.180903] ? tcp_req_err+0x510/0x510 [ 2884.180922] ? inet_dgram_connect+0x2e0/0x2e0 [ 2884.180939] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2884.180959] ? rcu_read_lock_sched_held+0x110/0x130 [ 2884.180977] ? kmem_cache_alloc_trace+0x354/0x760 [ 2884.180998] ? debug_smp_processor_id+0x1c/0x20 [ 2884.181012] ? perf_trace_lock+0x12f/0x750 [ 2884.181034] tcp_sendmsg_locked+0x28d5/0x3e80 [ 2884.181049] ? add_lock_to_list.isra.0+0x450/0x450 [ 2884.181065] ? print_usage_bug+0xd0/0xd0 [ 2884.226977] ? lock_sock_nested+0xac/0x120 [ 2884.227008] ? tcp_sendpage+0x60/0x60 [ 2884.227023] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2884.227040] ? trace_hardirqs_on+0xbd/0x310 [ 2884.227054] ? lock_sock_nested+0xe2/0x120 [ 2884.227069] ? trace_hardirqs_off_caller+0x300/0x300 [ 2884.227086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.236506] ? check_preemption_disabled+0x48/0x290 [ 2884.236528] ? lock_sock_nested+0x9a/0x120 [ 2884.236555] ? __local_bh_enable_ip+0x15a/0x270 [ 2884.236580] tcp_sendmsg+0x30/0x50 [ 2884.236599] inet_sendmsg+0x1af/0x740 [ 2884.236618] ? ipip_gro_receive+0x100/0x100 [ 2884.236632] ? smack_socket_sendmsg+0x157/0x1a0 [ 2884.236648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.253300] ? security_socket_sendmsg+0x93/0xc0 [ 2884.253320] ? ipip_gro_receive+0x100/0x100 [ 2884.253339] sock_sendmsg+0xdd/0x130 [ 2884.253356] __sys_sendto+0x387/0x5f0 [ 2884.253377] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2884.253392] ? wait_for_completion+0x810/0x810 [ 2884.253424] ? __sb_end_write+0xd9/0x110 [ 2884.253442] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2884.272607] ? fput+0x128/0x1a0 [ 2884.272626] ? do_syscall_64+0x8c/0x800 [ 2884.272640] ? do_syscall_64+0x8c/0x800 [ 2884.272655] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2884.272671] ? trace_hardirqs_on+0xbd/0x310 [ 2884.272684] ? __ia32_sys_read+0xb0/0xb0 [ 2884.272701] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2884.272716] ? trace_hardirqs_off_caller+0x300/0x300 [ 2884.272738] __x64_sys_sendto+0xe1/0x1a0 [ 2884.272756] do_syscall_64+0x1a3/0x800 [ 2884.386652] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2884.391606] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2884.396646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2884.401520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2884.406725] RIP: 0033:0x457ec9 03:41:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) getsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0xfd09, 0x28000) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) [ 2884.409925] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2884.428836] RSP: 002b:00007f7a103a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2884.436676] RAX: ffffffffffffffda RBX: 00007f7a103a7c90 RCX: 0000000000457ec9 [ 2884.444044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2884.451342] RBP: 000000000073bf00 R08: 00000000200008c0 R09: 0000000000000010 [ 2884.458618] R10: 00000000200007fd R11: 0000000000000246 R12: 00007f7a103a86d4 [ 2884.465896] R13: 00000000004c54a0 R14: 00000000004d9140 R15: 0000000000000004 03:41:19 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:19 executing program 4 (fault-call:2 fault-nth:3): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2884.542561] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000000001a000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) prctl$PR_SET_KEEPCAPS(0x8, 0x100000000000000) sendto(r0, &(0x7f0000000040)="2d8b175f442fa8cd73fc699bca7b2cea1e8f2571901ef8c43b3d1c4d2348afa0b7599dae8c6a87af0ce0a65c34c5ddc6ad0ab90cf584359cc934", 0x3a, 0x4000, 0x0, 0x0) 03:41:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x7000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2884.607331] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2884.680006] FAULT_INJECTION: forcing a failure. [ 2884.680006] name failslab, interval 1, probability 0, space 0, times 0 [ 2884.692342] CPU: 1 PID: 27973 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #27 [ 2884.699547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2884.708904] Call Trace: [ 2884.711513] dump_stack+0x1db/0x2d0 [ 2884.715152] ? dump_stack_print_info.cold+0x20/0x20 [ 2884.720178] ? mark_held_locks+0x100/0x100 [ 2884.724434] should_fail.cold+0xa/0x15 [ 2884.728325] ? print_usage_bug+0xd0/0xd0 [ 2884.732398] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2884.737529] ? __inet_hash_connect+0x202/0x1240 [ 2884.742326] ? inet_get_local_port_range+0x162/0x520 [ 2884.747436] ? inet_get_local_port_range+0x162/0x520 [ 2884.752541] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2884.757136] __should_failslab+0x121/0x190 [ 2884.761375] should_failslab+0x9/0x14 [ 2884.765177] kmem_cache_alloc+0x47/0x710 [ 2884.769238] ? lock_acquire+0x1db/0x570 [ 2884.773215] ? __inet_hash_connect+0x4e6/0x1240 [ 2884.777896] inet_bind_bucket_create+0x98/0x390 [ 2884.782578] ? inet_unhash+0xab0/0xab0 [ 2884.786492] __inet_hash_connect+0x814/0x1240 [ 2884.791001] ? __inet_lookup_established+0x640/0x640 [ 2884.796114] ? xfrm_policy_lookup+0x90/0x90 [ 2884.800449] ? inet_hash+0xb0/0xb0 [ 2884.804003] ? secure_ipv4_port_ephemeral+0x91/0x170 [ 2884.809115] ? secure_tcp_seq+0x190/0x190 [ 2884.813277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2884.818846] inet_hash_connect+0x7a/0x150 [ 2884.823002] tcp_v4_connect+0xe41/0x1da0 [ 2884.827086] ? tcp_v4_parse_md5_keys+0x360/0x360 [ 2884.831866] __inet_stream_connect+0x9a3/0x11b0 [ 2884.836538] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2884.841211] ? tcp_req_err+0x510/0x510 [ 2884.845110] ? inet_dgram_connect+0x2e0/0x2e0 [ 2884.849612] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2884.854295] ? rcu_read_lock_sched_held+0x110/0x130 [ 2884.859316] ? kmem_cache_alloc_trace+0x354/0x760 [ 2884.864165] ? debug_smp_processor_id+0x1c/0x20 [ 2884.868833] ? perf_trace_lock+0x12f/0x750 [ 2884.873078] tcp_sendmsg_locked+0x28d5/0x3e80 [ 2884.877577] ? add_lock_to_list.isra.0+0x450/0x450 [ 2884.882518] ? print_usage_bug+0xd0/0xd0 [ 2884.886597] ? lock_sock_nested+0xac/0x120 [ 2884.890853] ? tcp_sendpage+0x60/0x60 [ 2884.894655] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2884.899243] ? trace_hardirqs_on+0xbd/0x310 [ 2884.903585] ? lock_sock_nested+0xe2/0x120 [ 2884.907827] ? trace_hardirqs_off_caller+0x300/0x300 [ 2884.912932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.918472] ? check_preemption_disabled+0x48/0x290 [ 2884.923510] ? lock_sock_nested+0x9a/0x120 [ 2884.927760] ? __local_bh_enable_ip+0x15a/0x270 [ 2884.932614] tcp_sendmsg+0x30/0x50 [ 2884.936161] inet_sendmsg+0x1af/0x740 [ 2884.939973] ? ipip_gro_receive+0x100/0x100 [ 2884.944304] ? smack_socket_sendmsg+0x157/0x1a0 [ 2884.948975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2884.955236] ? security_socket_sendmsg+0x93/0xc0 [ 2884.960045] ? ipip_gro_receive+0x100/0x100 [ 2884.964377] sock_sendmsg+0xdd/0x130 [ 2884.968098] __sys_sendto+0x387/0x5f0 [ 2884.971910] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2884.976758] ? wait_for_completion+0x810/0x810 [ 2884.981365] ? __sb_end_write+0xd9/0x110 [ 2884.985436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2884.990976] ? fput+0x128/0x1a0 [ 2884.994264] ? do_syscall_64+0x8c/0x800 [ 2884.998238] ? do_syscall_64+0x8c/0x800 [ 2885.002223] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2885.006902] ? trace_hardirqs_on+0xbd/0x310 [ 2885.011228] ? __ia32_sys_read+0xb0/0xb0 [ 2885.015316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2885.020689] ? trace_hardirqs_off_caller+0x300/0x300 [ 2885.025806] __x64_sys_sendto+0xe1/0x1a0 [ 2885.029879] do_syscall_64+0x1a3/0x800 [ 2885.033774] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2885.038710] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2885.043767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2885.048629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2885.053837] RIP: 0033:0x457ec9 [ 2885.057040] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2885.075940] RSP: 002b:00007f7a103a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2885.083650] RAX: ffffffffffffffda RBX: 00007f7a103a7c90 RCX: 0000000000457ec9 [ 2885.090922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2885.098195] RBP: 000000000073bf00 R08: 00000000200008c0 R09: 0000000000000010 [ 2885.105465] R10: 00000000200007fd R11: 0000000000000246 R12: 00007f7a103a86d4 [ 2885.112742] R13: 00000000004c54a0 R14: 00000000004d9140 R15: 0000000000000004 [ 2885.168730] FAULT_INJECTION: forcing a failure. [ 2885.168730] name failslab, interval 1, probability 0, space 0, times 0 [ 2885.193316] CPU: 1 PID: 27977 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2885.200579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2885.209942] Call Trace: [ 2885.212553] dump_stack+0x1db/0x2d0 [ 2885.216201] ? dump_stack_print_info.cold+0x20/0x20 [ 2885.221253] should_fail.cold+0xa/0x15 [ 2885.225162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2885.230291] ? ___might_sleep+0x1e7/0x310 [ 2885.234453] ? arch_local_save_flags+0x50/0x50 [ 2885.239054] ? add_lock_to_list.isra.0+0x450/0x450 [ 2885.243997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.249536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.255086] __should_failslab+0x121/0x190 [ 2885.259333] should_failslab+0x9/0x14 [ 2885.263137] kmem_cache_alloc_node_trace+0x270/0x720 [ 2885.268249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2885.273797] ? find_next_bit+0x107/0x130 [ 2885.277877] blk_mq_init_tags+0x73/0x2c0 [ 2885.281952] blk_mq_alloc_rq_map+0x88/0x200 [ 2885.286290] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2885.290792] ? kasan_kmalloc+0x9/0x10 [ 2885.294604] blk_mq_alloc_tag_set+0x857/0xf00 [ 2885.299127] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2885.304320] ? __fget+0x472/0x710 [ 2885.307788] loop_add+0x2dc/0xa30 [ 2885.311255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.316803] ? loop_queue_rq+0x730/0x730 [ 2885.320871] ? rcu_read_unlock_special+0x380/0x380 [ 2885.325820] loop_control_ioctl+0x286/0x470 [ 2885.330148] ? loop_add+0xa30/0xa30 [ 2885.333789] ? iterate_fd+0x4b0/0x4b0 [ 2885.337600] ? loop_add+0xa30/0xa30 [ 2885.341236] do_vfs_ioctl+0x107b/0x17d0 [ 2885.345228] ? memset+0x32/0x40 [ 2885.348520] ? ioctl_preallocate+0x2f0/0x2f0 [ 2885.352939] ? smack_inode_setattr+0x290/0x290 [ 2885.357548] ? __fget_light+0x2db/0x420 [ 2885.361543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2885.367099] ? fput+0x128/0x1a0 [ 2885.370495] ? do_syscall_64+0x8c/0x800 [ 2885.374482] ? do_syscall_64+0x8c/0x800 [ 2885.378470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.384119] ? security_file_ioctl+0x93/0xc0 [ 2885.388640] ksys_ioctl+0xab/0xd0 [ 2885.392106] __x64_sys_ioctl+0x73/0xb0 [ 2885.396017] do_syscall_64+0x1a3/0x800 [ 2885.399929] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2885.404873] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2885.409900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2885.414761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2885.419950] RIP: 0033:0x457ec9 [ 2885.423152] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2885.442057] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2885.449774] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2885.457045] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 03:41:20 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2885.464316] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2885.471586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2885.478861] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2885.490512] blk-mq: reduced tag depth (128 -> 64) [ 2885.508255] input: syz1 as /devices/virtual/input/input4810 03:41:20 executing program 4 (fault-call:2 fault-nth:4): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x361) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = fcntl$getown(r0, 0x9) ptrace(0x4208, r1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2885.539463] input: syz0 as /devices/virtual/input/input4811 [ 2885.574994] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000ffffffef00001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x7fffffe, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2885.609921] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2885.623564] FAULT_INJECTION: forcing a failure. [ 2885.623564] name failslab, interval 1, probability 0, space 0, times 0 [ 2885.680041] CPU: 1 PID: 27988 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #27 [ 2885.687277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2885.696639] Call Trace: [ 2885.699245] dump_stack+0x1db/0x2d0 [ 2885.702884] ? dump_stack_print_info.cold+0x20/0x20 [ 2885.707926] should_fail.cold+0xa/0x15 [ 2885.711829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2885.716940] ? add_lock_to_list.isra.0+0x450/0x450 [ 2885.721883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.727440] ? check_preemption_disabled+0x48/0x290 [ 2885.732475] ? __lock_is_held+0xb6/0x140 [ 2885.736636] __should_failslab+0x121/0x190 [ 2885.740884] should_failslab+0x9/0x14 [ 2885.744691] kmem_cache_alloc+0x47/0x710 [ 2885.748757] ? find_exception+0x3d8/0xb90 [ 2885.752919] dst_alloc+0x10e/0x1d0 [ 2885.756465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.762017] rt_dst_alloc+0xf6/0x510 [ 2885.765738] ? fnhe_flush_routes+0x450/0x450 [ 2885.770159] ? __lock_is_held+0xb6/0x140 [ 2885.774246] ip_route_output_key_hash_rcu+0xa32/0x3470 [ 2885.779543] ? ip_route_input_noref+0x280/0x280 [ 2885.784218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.789762] ? check_preemption_disabled+0x48/0x290 [ 2885.794879] ? kasan_check_read+0x11/0x20 [ 2885.799049] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2885.804350] ? rcu_softirq_qs+0x20/0x20 [ 2885.808347] ip_route_output_key_hash+0x25d/0x400 [ 2885.813201] ? ip_route_output_key_hash_rcu+0x3470/0x3470 [ 2885.818756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.824300] ? check_preemption_disabled+0x48/0x290 [ 2885.829332] ip_route_output_flow+0x28/0xc0 [ 2885.833665] tcp_v4_connect+0x12a7/0x1da0 [ 2885.837843] ? tcp_v4_parse_md5_keys+0x360/0x360 [ 2885.842620] __inet_stream_connect+0x9a3/0x11b0 [ 2885.847297] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2885.851973] ? tcp_req_err+0x510/0x510 [ 2885.855872] ? inet_dgram_connect+0x2e0/0x2e0 [ 2885.860377] ? tcp_sendmsg_locked+0x275f/0x3e80 [ 2885.865069] ? rcu_read_lock_sched_held+0x110/0x130 [ 2885.870184] ? kmem_cache_alloc_trace+0x354/0x760 [ 2885.875035] ? debug_smp_processor_id+0x1c/0x20 [ 2885.879706] ? perf_trace_lock+0x12f/0x750 [ 2885.883952] tcp_sendmsg_locked+0x28d5/0x3e80 [ 2885.888451] ? add_lock_to_list.isra.0+0x450/0x450 [ 2885.893389] ? print_usage_bug+0xd0/0xd0 [ 2885.897473] ? lock_sock_nested+0xac/0x120 [ 2885.901728] ? tcp_sendpage+0x60/0x60 [ 2885.905535] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2885.910123] ? trace_hardirqs_on+0xbd/0x310 [ 2885.914457] ? lock_sock_nested+0xe2/0x120 [ 2885.918700] ? trace_hardirqs_off_caller+0x300/0x300 [ 2885.923813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.929357] ? check_preemption_disabled+0x48/0x290 [ 2885.934387] ? lock_sock_nested+0x9a/0x120 [ 2885.938639] ? __local_bh_enable_ip+0x15a/0x270 [ 2885.943324] tcp_sendmsg+0x30/0x50 [ 2885.946877] inet_sendmsg+0x1af/0x740 [ 2885.950690] ? ipip_gro_receive+0x100/0x100 [ 2885.955018] ? smack_socket_sendmsg+0x157/0x1a0 [ 2885.959692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2885.965239] ? security_socket_sendmsg+0x93/0xc0 [ 2885.970009] ? ipip_gro_receive+0x100/0x100 [ 2885.974337] sock_sendmsg+0xdd/0x130 [ 2885.978062] __sys_sendto+0x387/0x5f0 [ 2885.981875] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2885.986567] ? wait_for_completion+0x810/0x810 [ 2885.991289] ? __sb_end_write+0xd9/0x110 [ 2885.995360] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2886.000909] ? fput+0x128/0x1a0 [ 2886.004198] ? do_syscall_64+0x8c/0x800 [ 2886.008181] ? do_syscall_64+0x8c/0x800 [ 2886.012170] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2886.016758] ? trace_hardirqs_on+0xbd/0x310 [ 2886.021082] ? __ia32_sys_read+0xb0/0xb0 [ 2886.025152] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2886.030525] ? trace_hardirqs_off_caller+0x300/0x300 [ 2886.035642] __x64_sys_sendto+0xe1/0x1a0 [ 2886.039716] do_syscall_64+0x1a3/0x800 [ 2886.043611] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2886.048548] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2886.053593] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2886.058453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2886.063647] RIP: 0033:0x457ec9 03:41:20 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2886.066855] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2886.085775] RSP: 002b:00007f7a103a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2886.093489] RAX: ffffffffffffffda RBX: 00007f7a103a7c90 RCX: 0000000000457ec9 [ 2886.100759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2886.108131] RBP: 000000000073bf00 R08: 00000000200008c0 R09: 0000000000000010 [ 2886.115413] R10: 00000000200007fd R11: 0000000000000246 R12: 00007f7a103a86d4 [ 2886.123465] R13: 00000000004c54a0 R14: 00000000004d9140 R15: 0000000000000004 03:41:20 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syncfs(r0) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) io_setup(0x6, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x2, 0x40) r3 = dup3(r0, r0, 0x80000) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/btrfs-control\x00', 0x2000, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002640)='/dev/vcs\x00', 0x610842, 0x0) r6 = syz_open_dev$mice(&(0x7f0000002780)='/dev/input/mice\x00', 0x0, 0x200) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/sequencer\x00', 0xa0000, 0x0) io_submit(r1, 0x8, &(0x7f0000002940)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f0000000200)="f9b2e5ecb0d4b8c70c72a99379c558a4c1e322f8ee36e989be8e36d1a9b430e355b9de8bcbe056d60e0a6cb1bce03982b517d7f46bc7837ddc854e94bd530731c084009d2a29eac45a34af28c5c5fd814b4b6080645aec6c9579297b104b17408cba847839f7be2e58c2db3956598429fa4e242719783a6aabc8f52b113faed615b2602e7745700e93c039db13bde181f6464ceef9080b6d072758643b0cf3f14f37ec599e5b9a4bd338f6a9b6c068ca77e4af535729d6c64cd103cf177fdfde5fcdc8057418f869a2970e2faf0a7d55f97ab9d0", 0xd4, 0x7, 0x0, 0x2, r2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0xfffffffffffffffb, r0, &(0x7f0000000340)="c0922d8757aff7377628754a64aa83f541f1279a49223c1c1ef1e0", 0x1b, 0x5, 0x0, 0x3, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x7, 0x3f, r0, &(0x7f00000003c0)="ef4ba1789e0178262380160d74124f4164e36bd2fd5712db558a5fc1b343f9f5057a00b71672b84b5d654c2e96509a2a7468d2e9c0b75f24801d840ed5c3a90dd8f90c437b560c59ab9f3005879362fc4cfdb64a5c105c8bb200816a15ced95911c3ac67cd40aa6dd44c1d0084684326d8280abaa8cd90c781848aec774103cd6ac547e19d222f46597247645b5e2e945ec63731ea9ac21c80e70dfca69c3ce35c06378d2711ba25aae011d9fdff57d99c4d0c535ca069d26573737bbff2bba315d9b28ce190f9dd8d8a", 0xca, 0x6, 0x0, 0x1, r3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0xcead, r0, &(0x7f0000000500)="4467929973570f20c2398b98db2054f7da4e36bdad3900aa351e3964", 0x1c, 0x6, 0x0, 0x1}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x9, r0, &(0x7f00000005c0)="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", 0x1000, 0x7, 0x0, 0x1618fa24ec112b7c, r4}, &(0x7f0000002680)={0x0, 0x0, 0x0, 0x0, 0xab4c, r0, &(0x7f0000001640)="b1e6d154e0a81a6483d2e01ad7d79337da3d19450d1135f5256ac28cd7d77e97c75f264eed95e5f5d8fd09b9c50356e29c604b597a3c6513aa00c3703589307e8eb9e63b954b8f3a99255f3caaa88199a45bb0be1bb1f61766762b6bc7962e9e277db9a5910ed23276d9ff997ce76481c466ecc0d6a40eb1c0cded26431ef0ad2fa5a80b533c1aec1d645197b125ce47fbcfaae88ae5d71df3f4a93f5d4b36c5c716207827683a4be27f1efd7fd6ac9601143a72393caf26d866e0ca9086145b963270b03d4f9325823f66f7f97ac5b189870efed51c85fdf215c7c63244a076c5d0f290f9b2b9a0591d2bdb0083fd56b35384c8ac51996fdeb10e0643e65ccf34280c039a07101c12edfaaca0c9fc282a4e56c35a2c3eaab9108dd9bf016f8d2ca4af426d433af26cd7d81af6b9947b7bb2ae2d7b9efd0d73efb516d57513eaa720787ccb305e97cdf025de0bcb460a227d23c945fc0c540ffa3b0723448d51878ff885dc9228b7f93c8aff5945ad962a2c55f249fd92867c3acee148dab49580f5d940a06117b55ee77d4e8aa2ef7f715b2a196563f8a26e56ba7f86d4cd7d1f09fd6ccec6f8fb97259f5c0478c5903f263961eafa8f5f1ed7df3c22b21fd5ad7fe6202848eca78ab3d1f05eaccea9067144422006731324e6eff8f33fe6fc3cc3ffa7122d398f1a6da5c568562c5ee98c79d18514ae9ab578f8aff2a02787ebdad3dac7530829e81357f6050cf7cd3252ea0b810eff707c8c38a46febf922fe8c354381f5fa10eb8e781a018c9452bd6b9868d1e06133dd130bd89a6a29d8c6a0bdc79965eb077d89e786bb69c8cf054c69056fa24a5029695582a22094f7f0f4d1037160609027ef1413dfb67b678fa0d5069612884d22bbc862d7d7dd75f5517a43882ef36a8486f393e49fbd50f6cb4e537d0575c2b52157b2d7ba207e395796c065f59d92c7cd926427076d72d8d0c8181ec4dd5f72c29067f23216ec0df8cbcb70bc2d05391d715c248634e43c993fbdc437f9ac7578d9150e4f5afe4faf7c977f3af39077767da11ec187e2cce7ab8a8ce94a2c83c3ac02119f1cf3750904a13ac0609019d37578869f37299b264d0d167779e090c9dde87c1a678d00a203285a153382b0e283311e359c83aa0c8a0b5f06f2ec25b254ab5fa2035a22b0fb921b8b80ba5008ee0c5b98c1dc2b4a696a1932d4cab98b902b6c1738fdf71250040c80bf5c3e2415f64b9e49be4646b72c30b00a19a1b4c9d3144e44a80c3fe34249d104f524fad5bf1b6b535827a37ef6e2853c675a399dc909f88a64706e481a84dc9c42b2db00627d1ec443fb5c20dcbd724aad8c03d5b6a9b559f501d055a4ab467cd69bfdc1e9ac9fc8401863eb14c90243a93f07ffb936d81cb4d915dae01edcec5793f2c763b7fececb597ac9e2fb77dc61e632f50475eb3ea7ebc9547a5085e5e152231fb17bd62f5c1aae6aef9bc91f7e68f910982ba675e4a881467555021e049362b93c944bc46eff44e5232fcd285869a0da76710531d946aab49c3898960d5acb78bd028b01ece69c8181a7c925353249b8e0ad821fadb6ff2530bd215cbddd1181963764e56a4fe21dd1120cf03be876c885e245c1474a7c8939212ac0f6a81acecb60a8a00114a4a7b422ab04e10830d27029444319f9e56b175bce8db9f141c05832d1c78fb1d974b8bcce2cc6ab085da2831116b437cd5f913c1d03719ca116b46c251ce896d6d6ecb634939e91645f98c18915be9293a77343bd6dc730339ae358f3281280286957e5939fa279eba49f1ed87c0822f03a2fd7990aa42f79971d0be35d1777b3e2723e2ee457a3e28a12e391c23c55e57adaacc8ce599cd955341e5f8ab17ee83e0bac4faf947d6d77c78cee49131e7bdc645d225da0cee641f838f9e7fec0f234418582c519d107cd895c1e7f76f5eb3ebb41075a3f09a8c23e80e4abbbd3030c3ca73602ec86bbf9feb09ff2e50d520a77e6468fa01d6ca8e7ba7fc96b54d488e9401417e6a8fcc52e6d6402c3b10f37c23fa36555e9f73c2d08ea206f64624f844930984644816d2c6f6acebfa201de80387b2b6bebc1ffa940ccd05cfbeff990424737a42565752b03b0ce2927791820bdbb29b89867237b0415e23c62108989f97f24c701cdfca4dce2589881c842ed3382d6517d794e22bde21b786543ccf8a2214696a7052f41d264d95fe7cc578db8bb04805565cc36b1acd2daa040fa44ddef720e609b938c0d3b1464c658c85de799a6438644d02fc55bbaa38de75ed8dc3a8444d3c4ebb6e477a0d3c7146c84c76b64173df1b848608b7b992560dad9856186c3381941ede4f5c8533d1979623ec63a964e3ff88e4a740ef12af3753a440f9ef841f8e31aedec580f150971c081d62171b121b9c7ba6f50e8603391de8c65d9989fa2d8e9b02897d76e89930ca6a5ed7657c617a59155d51da1c0d3f08d28b614e1b447e1ef02141ad985281bba023ddfbff431d6d3a4b2e2cece2e3bcbc19c31e86bd74dbf472edb21cd28e55786391508c2262f75a3720972f580febc6049815ada1cd133d4975346c4d50915a593e338beba9c67ef4d6f36beb80ec14c5996e4b4fe8ec0c66b646e47b43e014ab7a242fb7feb80354e948c30b0adf1873b202e2be4ef074263dc93c8173572e6deb4be6ae2f69a428e1886a986abb3abc308fac8039cda22c8d07fa03b87a253ba229c8e4e604d6fa6463c7c2426b1ee5ab703c607847c94882c6c0757d25ca2b06cdf82f01c13d4ea19014a4af74346eff3797fab15e639e546d49eefd2e6e7a4e24161e058cd5be36adb7bc53b43a992733251c5c844833be36fac37b9361cc9d481899b0160b86d68ef616e682fd2e9e6dc85229e3ad66764f205916ede311786292499df38e0b7933e70527115f0cc7e9676ee96994463150b5076b87ae7cb344359845d9d03319342405517504d4ab849ade9bd4d351874e94fde76c9eb04f1fd082f02a3a203cd74f7d1adbd2511b9703f9f5bced8cdcf5dcf1de430c7d8b99a7c4da1d222bbc8205fc0b957b97d85b9eeacb45b73a176e4de373f66b72b186dc7ffb549acfd681079e4187615621abe301a5b9b61d36d9f04d90cc05831e1fcd4f5cddf37371514cae0340de1e78331ca39d593b4a7b22d6ecf1162a75e2de431c80ba161d20ba6af7874336caaddfc824ec54d96af218455dd04027e40e1b32adf0f3d527465d6e5e77cc9d4150acc64a488eeb9c783726022ef3e51449a07954cdc0d8abfc79783e31ed3b7cab628010e4908d0b7251dd27df91703662444ae1b80eb6f6205d5de4104e131fcade88a3b735fb11e0a186a5b101a8d2c09ac7a83bd610017e743178aa937661dec5dd556ef4ad27e249b9cdc2833f73b1a7b966e15ff41e240c5ddced94579493294b74e81766975018df569d65eea9cb543738a13a4a9e2d7349dedf88bbf4e10cc6c55bf7cb4116bb0c5b7e6632eb8a4163e1c9b91e9f6609d50b1ca93fb79600de0c4fc0f4314cbde2b00521beb96a5ee13c1d31722cd2e5bb41982bd25b058f6e7cea22e693151abe2361ac8ee8f476b4be39b34f4ddeb9da97b8ff35c3544a7baaf5ba3c57fe16d2eb8431f7941f58dbd80b85dd9d2c9cdbc5766362e44bd19b3ab3316f3d093668656c905779a0c170959dba5eb3b92a1e30dc0a3aa77987509765f032652d2b20d987820ab057e37848c9b2bcd1a0e6c87d38be20373088ecf19be93c9640aecd58569da4fec4611f6b58ecf0165bd95ee0ef2180075d1906a2c085a6356ee903c9648c111ad8c8c1814eb85a7fdb841e20db923a9a3e6632d31d848bd1dcb271213b6e38fb14c18fc6ff8617f8285638172750b74e729e4b699ea735fb9532fba34e2926cb513dd5a82961fca0b342b9ee5580c98714f939ac71d47b899b20d92f47f3ae93d1e1ff59d174f2bd242cb90fbac302a094d7785a77efd08617cef77b53ce7243e32199c878f93dbdb94ac4e62c52506fc72bfc692146c058bff379dceba0e945c29efe1bf4d95e8fe7742defb8936af55978f66cea672540cbfe87fe8103fe38b2ac35419b3b2788c28b79989614d36b6d2e2db0c7a54f3508c6f8f7611dd269d7b9edbac27485391fb8dd0f35921a50515471f3fbd5f8627838f13e726f57f25ba80abea1778bc682bcdd240777abebe9617c78b749da4b116229df227464fb25060e7ea93d860a461e3b1bc4b1c017c0e216eebb9cadfa41d2240aaa66d478e62bf52cc992b569f7e31fd947a5bdb9f49cb2bdcf80095cb992a94754343a84db5c31ead6cc62990cd4ffa8b7f3f88f90a8a74b419cc6097820883765edbe8cf1f8b93213868f368ffcda141493860854b13dd9997d2a7a6b9c0ada07db0bbabea858199a9373a33e6b4511f8cdfbeed5211bd84edb6c73aa95a79f9c378c5f6c0e37202039a4f40aa69640edb6c752732e573b0bc793259f9566fdda9da8e2b438f63936a5327bd1e49c6f5ad4022e3b72f4a0fc21a19e6f782e399f9d1bcb11d1ea0fbe4a89a19c8669dd48bd06c189bc3f60aed3eca8e1a38654a61237f3cf51aa362b741b7b21e9df528d42aba58411f79a57e5d3c6a9036691b979a09478d04d6fdbabb309c3a0b3132c2a7e2181eccec5b26fc814530bbc745558b08682b62df16619ffd4d0d7b374d98ece68fb0e2f5f6f529e4f5b8e063b06f0ff0d51206f96d16994ee6fa047af982d3c212b3d6257d9497214797b90183d3b5ed7462a69673b861dedbd157a505ad16210b3f854d9fe062d0ec4079a8d159761ddc0d47aed5d31988090639552629ed81136e468af0ff0bfccc30211ea0f500aba740cf6c02439854c60647b93402afd701eb092178006fdf27f5bb188004419c4bd299ee97a4ab199129d57d6dd0a826534083ed476d39b55a01484fad136e5b97dbf0ddaabd65caf346b3c2c79897d9511fd0261eb7aa924421ad130706fbc835f61dcba1eed1ef38f7602ac23c3ca01e8ead44945c41e3b42c4df3572742cc9c98c9b704d3e365ad1202fb3ec013499e7ff2ee53b405511370aa6e5e94e89f37ef98cd89ce56ce45d8699caecd708cfef680f2b338f63d6b093aae2166c96125d106a2bfa9eb36a078944e7bdfaf55373f8d838e734e2d770566cde9495563d7cf5d32ba650af39d3c3a042810e26f276781fcc8a233b10b118ab0b40112bda09f0167c258f374fb99d26368d85585f7bb1d6804d4ea3f0d87b3e837e4be5bc2876ca3caaf3aa3c5db46dba460c22fee5c901ddc4d6be6c3eba2cf40e5959fe637b286f1e2bd7a60c365562a1a88968d7c4fa19923f0bfc44ab5906ba227c21ce082649072de67b08de8a3c14728de7f65402c8ebb07b8e6badbfa2393f8edbd3d2fa8293df75bac1bca217e27945a68608fd4a5429e727fe5784d5c613f503fb82355a5946bb870b065d343884e40e156693d4be60bc05f7c42853349d7b71a03cd7ead6f699277773a6c71c849e180f2be62c9bc2b31675b3fdaa307e81780991ea4e42e719b3bf33cb365d630e414b9c45328e44a00ab7e9feb733800b7822e61ef1261f019ab0f8c833287c4247176c57ffc597a3a0bb59b56371ec5c9e89d51912065b2c610652db9954d06ca9a47d50b842c7f26e33e8417351b7d9f3c360b66f0f6d675ecfc40c8f82e67a80d2dc1a286fdde89ab81e2054b2bc630d65ce851e53277b7c50c03e9931b7928ad2602fb640051055d6ca669a703e373b11854d8d139d598e2bc3849caccba4c2d412b761562f2515cf4", 0x1000, 0x80, 0x0, 0x2, r5}, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x1, 0xff, r0, &(0x7f00000026c0)="04c16fe9f546c74761daee521dbfc56a9294b395e67a4aa9c236ac21d8436a567e9ab750869672877258ea80850ce6619a484e7667d4ac864d227eb28fd9151a4eb9e4c4ffae03201427089f5c22e6bdaeeafbe9eaf678198428e8901ab3a0031735e673fc087621e0056f932acb76321602ebb1de99f8798f718f201d621e43ad27178ba506be32d30924a7e18776acf5ca0bec07470f9483fb7a71da237de44adea1b0bdeb", 0xa6, 0x4, 0x0, 0x2, r6}, &(0x7f0000002900)={0x0, 0x0, 0x0, 0x3, 0x5, r0, &(0x7f0000002800)="84848c792e606ca083dfc71c59d3dd5215c24a9592bd8311a785f9d75d82cad1db6ec413e10db65872f27470b5ecb8d73dc1c285b5021dd0ea782bb0c633d5bcfe93bac998ba5da633756f709ed149fe3889e7e9ba290dfd460a1f4e04d41fa1bdbbb7b3e0da078f3fbac82c07c4a3f13571baa523978f57bd3eead2342d3f110b1b9a4e97909cde037b81ce83909b17d45d532f7633dd69", 0x98, 0x1, 0x0, 0x0, r7}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2886.222050] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2886.248015] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x20000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2886.298944] FAULT_INJECTION: forcing a failure. [ 2886.298944] name failslab, interval 1, probability 0, space 0, times 0 [ 2886.314823] CPU: 0 PID: 27999 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2886.322063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2886.331428] Call Trace: [ 2886.334042] dump_stack+0x1db/0x2d0 [ 2886.337696] ? dump_stack_print_info.cold+0x20/0x20 [ 2886.342731] ? kernel_text_address+0x73/0xf0 [ 2886.347175] should_fail.cold+0xa/0x15 [ 2886.351085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2886.356209] ? ___might_sleep+0x1e7/0x310 [ 2886.360382] ? arch_local_save_flags+0x50/0x50 [ 2886.365081] ? blk_mq_init_tags+0x73/0x2c0 [ 2886.369410] ? blk_mq_alloc_rq_map+0x88/0x200 [ 2886.373913] ? loop_add+0x2dc/0xa30 [ 2886.377548] ? loop_control_ioctl+0x286/0x470 [ 2886.382059] __should_failslab+0x121/0x190 [ 2886.386310] should_failslab+0x9/0x14 [ 2886.390125] kmem_cache_alloc_node_trace+0x270/0x720 [ 2886.395244] ? __lock_is_held+0xb6/0x140 [ 2886.399411] __kmalloc_node+0x3d/0x70 [ 2886.403301] sbitmap_init_node+0x29e/0x510 [ 2886.407560] sbitmap_queue_init_node+0xad/0x8c0 [ 2886.412240] ? blk_mq_init_tags+0x73/0x2c0 [ 2886.416493] ? sbitmap_init_node+0x510/0x510 [ 2886.420917] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2886.426207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2886.431785] ? find_next_bit+0x107/0x130 [ 2886.435872] blk_mq_init_tags+0x119/0x2c0 [ 2886.440064] blk_mq_alloc_rq_map+0x88/0x200 [ 2886.444401] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2886.448907] ? kasan_kmalloc+0x9/0x10 [ 2886.452747] blk_mq_alloc_tag_set+0x857/0xf00 [ 2886.457267] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2886.462478] ? __fget+0x472/0x710 [ 2886.465957] loop_add+0x2dc/0xa30 [ 2886.469423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2886.474982] ? loop_queue_rq+0x730/0x730 [ 2886.479061] ? rcu_read_unlock_special+0x380/0x380 [ 2886.484016] loop_control_ioctl+0x286/0x470 [ 2886.488362] ? loop_add+0xa30/0xa30 [ 2886.492010] ? iterate_fd+0x4b0/0x4b0 [ 2886.495828] ? loop_add+0xa30/0xa30 [ 2886.499469] do_vfs_ioctl+0x107b/0x17d0 [ 2886.503460] ? memset+0x32/0x40 [ 2886.506748] ? ioctl_preallocate+0x2f0/0x2f0 [ 2886.511170] ? smack_inode_setattr+0x290/0x290 [ 2886.515760] ? __fget_light+0x2db/0x420 [ 2886.519750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2886.525300] ? fput+0x128/0x1a0 [ 2886.528590] ? do_syscall_64+0x8c/0x800 [ 2886.532580] ? do_syscall_64+0x8c/0x800 [ 2886.536575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2886.542154] ? security_file_ioctl+0x93/0xc0 [ 2886.546583] ksys_ioctl+0xab/0xd0 [ 2886.550055] __x64_sys_ioctl+0x73/0xb0 [ 2886.553952] do_syscall_64+0x1a3/0x800 [ 2886.557856] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2886.562828] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2886.567859] ? __switch_to_asm+0x34/0x70 [ 2886.571935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2886.576799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2886.581997] RIP: 0033:0x457ec9 03:41:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300007fffffff00001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2886.585202] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2886.604114] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2886.611835] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2886.619116] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2886.626407] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2886.633692] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2886.640981] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2886.675654] blk-mq: reduced tag depth (128 -> 64) 03:41:21 executing program 4 (fault-call:2 fault-nth:5): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000efffffff00001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2886.764859] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2886.784582] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x60000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x2, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2886.891810] input: syz1 as /devices/virtual/input/input4814 [ 2886.913944] input: syz1 as /devices/virtual/input/input4815 [ 2886.988135] FAULT_INJECTION: forcing a failure. [ 2886.988135] name failslab, interval 1, probability 0, space 0, times 0 [ 2887.014023] CPU: 0 PID: 28023 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2887.021265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2887.030637] Call Trace: [ 2887.033250] dump_stack+0x1db/0x2d0 [ 2887.036899] ? dump_stack_print_info.cold+0x20/0x20 [ 2887.041935] ? __lock_is_held+0xb6/0x140 [ 2887.046027] should_fail.cold+0xa/0x15 [ 2887.049939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2887.055075] ? ___might_sleep+0x1e7/0x310 [ 2887.059240] ? arch_local_save_flags+0x50/0x50 [ 2887.063848] ? kasan_unpoison_shadow+0x35/0x50 [ 2887.068454] __should_failslab+0x121/0x190 [ 2887.072716] should_failslab+0x9/0x14 [ 2887.076528] kmem_cache_alloc_node_trace+0x270/0x720 [ 2887.081650] ? check_preemption_disabled+0x48/0x290 [ 2887.086679] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2887.091889] ? find_next_bit+0x107/0x130 [ 2887.095970] sbitmap_queue_init_node+0x3ac/0x8c0 [ 2887.100749] ? sbitmap_init_node+0x510/0x510 [ 2887.105170] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2887.110458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2887.116013] ? find_next_bit+0x107/0x130 [ 2887.120094] blk_mq_init_tags+0x119/0x2c0 [ 2887.124260] blk_mq_alloc_rq_map+0x88/0x200 [ 2887.128610] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2887.133116] ? kasan_kmalloc+0x9/0x10 [ 2887.137401] blk_mq_alloc_tag_set+0x857/0xf00 [ 2887.141924] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2887.147126] ? __fget+0x472/0x710 [ 2887.150607] loop_add+0x2dc/0xa30 [ 2887.154072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2887.159632] ? loop_queue_rq+0x730/0x730 [ 2887.163707] ? rcu_read_unlock_special+0x380/0x380 [ 2887.168666] loop_control_ioctl+0x286/0x470 [ 2887.173004] ? loop_add+0xa30/0xa30 [ 2887.176648] ? iterate_fd+0x4b0/0x4b0 [ 2887.180467] ? loop_add+0xa30/0xa30 [ 2887.184105] do_vfs_ioctl+0x107b/0x17d0 [ 2887.188096] ? memset+0x32/0x40 [ 2887.191390] ? ioctl_preallocate+0x2f0/0x2f0 [ 2887.195812] ? smack_inode_setattr+0x290/0x290 [ 2887.200402] ? __fget_light+0x2db/0x420 [ 2887.204399] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2887.209944] ? fput+0x128/0x1a0 [ 2887.213237] ? do_syscall_64+0x8c/0x800 [ 2887.217219] ? do_syscall_64+0x8c/0x800 [ 2887.221206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2887.226763] ? security_file_ioctl+0x93/0xc0 [ 2887.231192] ksys_ioctl+0xab/0xd0 [ 2887.234660] __x64_sys_ioctl+0x73/0xb0 03:41:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth0_to_bond\x00', 0x2fb) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x20) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x8, 0x7fffffff, 0x6, 0xc58d}]}) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000240)) [ 2887.238582] do_syscall_64+0x1a3/0x800 [ 2887.242489] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2887.247434] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2887.252459] ? __switch_to_asm+0x34/0x70 [ 2887.256540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2887.261411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2887.266611] RIP: 0033:0x457ec9 [ 2887.269814] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:41:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2887.288751] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2887.296475] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2887.303756] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2887.311756] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2887.319034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2887.326319] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2887.343356] blk-mq: reduced tag depth (128 -> 64) 03:41:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000002000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:21 executing program 4 (fault-call:2 fault-nth:6): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x4, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2887.474115] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2887.518497] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0xfeffff07, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2887.585006] input: syz1 as /devices/virtual/input/input4816 [ 2887.598975] input: syz1 as /devices/virtual/input/input4817 03:41:22 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x9, 0x80) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000180)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @empty}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000300)={r2, @in={{0x2, 0x4e20, @loopback}}}, 0x84) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r1, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000004000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2887.666387] FAULT_INJECTION: forcing a failure. [ 2887.666387] name failslab, interval 1, probability 0, space 0, times 0 03:41:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2887.711925] CPU: 0 PID: 28048 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2887.719184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2887.728552] Call Trace: [ 2887.731173] dump_stack+0x1db/0x2d0 [ 2887.734828] ? dump_stack_print_info.cold+0x20/0x20 [ 2887.739866] ? __lock_is_held+0xb6/0x140 [ 2887.744048] should_fail.cold+0xa/0x15 [ 2887.747975] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2887.753103] ? ___might_sleep+0x1e7/0x310 [ 2887.757276] ? arch_local_save_flags+0x50/0x50 [ 2887.761892] __should_failslab+0x121/0x190 [ 2887.766143] should_failslab+0x9/0x14 [ 2887.769953] kmem_cache_alloc_node_trace+0x270/0x720 [ 2887.775070] ? init_wait_entry+0x1c0/0x1c0 [ 2887.779321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2887.784874] ? sbitmap_init_node+0x149/0x510 [ 2887.789310] sbitmap_queue_init_node+0x3ac/0x8c0 [ 2887.794092] ? sbitmap_init_node+0x510/0x510 [ 2887.798553] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2887.803846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2887.809399] ? find_next_bit+0x107/0x130 [ 2887.813491] blk_mq_init_tags+0x17b/0x2c0 [ 2887.817677] blk_mq_alloc_rq_map+0x88/0x200 [ 2887.822022] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2887.826534] ? kasan_kmalloc+0x9/0x10 [ 2887.830349] blk_mq_alloc_tag_set+0x857/0xf00 [ 2887.834863] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2887.840067] ? __fget+0x472/0x710 [ 2887.843558] loop_add+0x2dc/0xa30 [ 2887.847021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2887.852574] ? loop_queue_rq+0x730/0x730 [ 2887.856652] ? rcu_read_unlock_special+0x380/0x380 [ 2887.861609] loop_control_ioctl+0x286/0x470 [ 2887.865945] ? loop_add+0xa30/0xa30 [ 2887.869587] ? iterate_fd+0x4b0/0x4b0 [ 2887.873402] ? loop_add+0xa30/0xa30 [ 2887.877042] do_vfs_ioctl+0x107b/0x17d0 [ 2887.881035] ? memset+0x32/0x40 [ 2887.884335] ? ioctl_preallocate+0x2f0/0x2f0 [ 2887.888753] ? smack_inode_setattr+0x290/0x290 [ 2887.893347] ? __fget_light+0x2db/0x420 [ 2887.897344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2887.902918] ? fput+0x128/0x1a0 [ 2887.906215] ? do_syscall_64+0x8c/0x800 [ 2887.910318] ? do_syscall_64+0x8c/0x800 [ 2887.914306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2887.919860] ? security_file_ioctl+0x93/0xc0 [ 2887.924290] ksys_ioctl+0xab/0xd0 [ 2887.927763] __x64_sys_ioctl+0x73/0xb0 [ 2887.931665] do_syscall_64+0x1a3/0x800 [ 2887.935572] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2887.940521] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2887.945562] ? __switch_to_asm+0x34/0x70 [ 2887.949647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2887.954534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2887.959735] RIP: 0033:0x457ec9 03:41:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x6, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2887.962939] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2887.981971] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2887.989698] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2887.996979] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2888.004262] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2888.011538] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2888.018820] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0xc00) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0x80000000038, &(0x7f0000000140), &(0x7f0000013000)=0x4) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r1) fchdir(r0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:22 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2888.060700] blk-mq: reduced tag depth (128 -> 64) 03:41:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000005000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:22 executing program 4 (fault-call:2 fault-nth:7): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x7, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2888.139126] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2888.164435] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0xff000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2888.224371] input: syz1 as /devices/virtual/input/input4818 03:41:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000180)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2888.291755] input: syz1 as /devices/virtual/input/input4819 03:41:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xa, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000008000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2888.376363] FAULT_INJECTION: forcing a failure. [ 2888.376363] name failslab, interval 1, probability 0, space 0, times 0 [ 2888.416202] CPU: 1 PID: 28080 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2888.423453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2888.432808] Call Trace: [ 2888.435407] dump_stack+0x1db/0x2d0 [ 2888.439046] ? dump_stack_print_info.cold+0x20/0x20 [ 2888.444088] should_fail.cold+0xa/0x15 [ 2888.447987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2888.453109] ? ___might_sleep+0x1e7/0x310 [ 2888.457271] ? arch_local_save_flags+0x50/0x50 [ 2888.461860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2888.467407] ? sbitmap_queue_init_node+0xc9/0x8c0 [ 2888.472266] __should_failslab+0x121/0x190 [ 2888.476516] should_failslab+0x9/0x14 [ 2888.480326] kmem_cache_alloc_node_trace+0x270/0x720 [ 2888.485433] ? find_next_bit+0x107/0x130 [ 2888.489511] __kmalloc_node+0x3d/0x70 [ 2888.493325] blk_mq_alloc_rq_map+0xb9/0x200 [ 2888.497659] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2888.502154] ? kasan_kmalloc+0x9/0x10 [ 2888.505973] blk_mq_alloc_tag_set+0x857/0xf00 [ 2888.510594] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2888.515804] loop_add+0x2dc/0xa30 [ 2888.519261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2888.524927] ? loop_queue_rq+0x730/0x730 [ 2888.529087] ? rcu_read_unlock_special+0x380/0x380 [ 2888.534034] loop_control_ioctl+0x286/0x470 [ 2888.538359] ? loop_add+0xa30/0xa30 [ 2888.541996] ? iterate_fd+0x4b0/0x4b0 [ 2888.545803] ? loop_add+0xa30/0xa30 [ 2888.549440] do_vfs_ioctl+0x107b/0x17d0 [ 2888.553421] ? memset+0x32/0x40 [ 2888.556708] ? ioctl_preallocate+0x2f0/0x2f0 [ 2888.561123] ? smack_inode_setattr+0x290/0x290 [ 2888.565707] ? __fget_light+0x2db/0x420 [ 2888.569692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2888.575234] ? fput+0x128/0x1a0 [ 2888.578532] ? do_syscall_64+0x8c/0x800 [ 2888.582511] ? do_syscall_64+0x8c/0x800 [ 2888.586497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2888.592041] ? security_file_ioctl+0x93/0xc0 [ 2888.596456] ksys_ioctl+0xab/0xd0 [ 2888.599920] __x64_sys_ioctl+0x73/0xb0 [ 2888.603824] do_syscall_64+0x1a3/0x800 [ 2888.607807] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2888.612745] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2888.617763] ? __switch_to_asm+0x34/0x70 [ 2888.621834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2888.626692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2888.631882] RIP: 0033:0x457ec9 [ 2888.635084] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2888.654087] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2888.661820] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2888.669091] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 03:41:23 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2888.676362] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2888.683631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2888.690927] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2888.709931] blk-mq: reduced tag depth (128 -> 64) 03:41:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x450102, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000200)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:23 executing program 4 (fault-call:2 fault-nth:8): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x100000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2888.819632] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2888.842457] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000010000000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2888.938367] input: syz1 as /devices/virtual/input/input4820 [ 2888.962999] input: syz1 as /devices/virtual/input/input4821 03:41:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x10000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000180)={0x2, "0901"}, 0x3) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @broadcast}, 0x10) mq_unlink(&(0x7f0000000240)='vboxnet1md5sum/\x00') setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3c, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2889.049772] FAULT_INJECTION: forcing a failure. [ 2889.049772] name failslab, interval 1, probability 0, space 0, times 0 [ 2889.081427] CPU: 0 PID: 28099 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2889.088668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2889.098131] Call Trace: [ 2889.100733] dump_stack+0x1db/0x2d0 [ 2889.104371] ? dump_stack_print_info.cold+0x20/0x20 [ 2889.109415] ? save_stack+0x45/0xd0 [ 2889.113057] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2889.118181] ? kasan_kmalloc+0x9/0x10 [ 2889.121999] ? blk_mq_alloc_rq_map+0xb9/0x200 [ 2889.126519] should_fail.cold+0xa/0x15 [ 2889.130425] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2889.135555] ? ___might_sleep+0x1e7/0x310 [ 2889.139719] ? arch_local_save_flags+0x50/0x50 [ 2889.144321] ? __lock_is_held+0xb6/0x140 [ 2889.148405] __should_failslab+0x121/0x190 [ 2889.152648] should_failslab+0x9/0x14 [ 2889.156464] kmem_cache_alloc_node_trace+0x270/0x720 [ 2889.161576] ? kasan_unpoison_shadow+0x35/0x50 [ 2889.164401] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2889.166610] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2889.166630] __kmalloc_node+0x3d/0x70 [ 2889.166650] blk_mq_alloc_rq_map+0xfa/0x200 [ 2889.166668] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2889.166680] ? kasan_kmalloc+0x9/0x10 [ 2889.166698] blk_mq_alloc_tag_set+0x857/0xf00 [ 2889.201123] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2889.206327] ? __fget+0x472/0x710 [ 2889.209797] loop_add+0x2dc/0xa30 [ 2889.213257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2889.218805] ? loop_queue_rq+0x730/0x730 [ 2889.222877] ? rcu_read_unlock_special+0x380/0x380 [ 2889.227835] loop_control_ioctl+0x286/0x470 [ 2889.232166] ? loop_add+0xa30/0xa30 [ 2889.235815] ? iterate_fd+0x4b0/0x4b0 [ 2889.239638] ? loop_add+0xa30/0xa30 [ 2889.243282] do_vfs_ioctl+0x107b/0x17d0 [ 2889.247270] ? memset+0x32/0x40 [ 2889.250562] ? ioctl_preallocate+0x2f0/0x2f0 [ 2889.254986] ? smack_inode_setattr+0x290/0x290 [ 2889.259700] ? __fget_light+0x2db/0x420 [ 2889.263704] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2889.269261] ? fput+0x128/0x1a0 [ 2889.272555] ? do_syscall_64+0x8c/0x800 [ 2889.276548] ? do_syscall_64+0x8c/0x800 [ 2889.280621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2889.286179] ? security_file_ioctl+0x93/0xc0 [ 2889.290609] ksys_ioctl+0xab/0xd0 [ 2889.294081] __x64_sys_ioctl+0x73/0xb0 [ 2889.297997] do_syscall_64+0x1a3/0x800 [ 2889.301905] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2889.306854] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2889.311885] ? __switch_to_asm+0x34/0x70 [ 2889.315968] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2889.320924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2889.326138] RIP: 0033:0x457ec9 [ 2889.329345] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:41:23 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x200000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2889.348267] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2889.355991] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2889.363268] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2889.370548] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2889.377836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2889.385128] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400080) ioctl$TCSBRKP(r1, 0x5425, 0x4) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2889.443682] blk-mq: reduced tag depth (128 -> 64) 03:41:24 executing program 4 (fault-call:2 fault-nth:9): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2889.515774] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2889.542779] input: syz1 as /devices/virtual/input/input4822 03:41:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000a0010000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2889.564844] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2889.584760] input: syz1 as /devices/virtual/input/input4823 03:41:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x1a0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x300000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x1000) listen(r0, 0xfff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x2, 0x0, 0x231) 03:41:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000050000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x1f4, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2889.792354] FAULT_INJECTION: forcing a failure. [ 2889.792354] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2889.826184] CPU: 0 PID: 28133 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2889.833518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2889.842884] Call Trace: [ 2889.845494] dump_stack+0x1db/0x2d0 [ 2889.849152] ? dump_stack_print_info.cold+0x20/0x20 [ 2889.854198] ? rcu_read_unlock_special+0x380/0x380 [ 2889.859155] should_fail.cold+0xa/0x15 [ 2889.863083] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2889.868355] ? unwind_get_return_address+0x61/0xa0 [ 2889.873310] ? arch_local_save_flags+0x50/0x50 [ 2889.877918] ? __save_stack_trace+0x8a/0xf0 [ 2889.882275] should_fail_alloc_page+0x50/0x60 [ 2889.886787] __alloc_pages_nodemask+0x323/0xdc0 [ 2889.891463] ? save_stack+0x45/0xd0 [ 2889.895100] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2889.900215] ? kasan_kmalloc+0x9/0x10 [ 2889.904033] ? __kmalloc_node+0x4e/0x70 [ 2889.908038] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2889.913084] ? do_syscall_64+0x1a3/0x800 [ 2889.917175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2889.922558] ? lockdep_init_map+0x10c/0x5b0 [ 2889.926904] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2889.932463] ? find_next_bit+0x107/0x130 [ 2889.936567] ? __cpu_to_node+0x7e/0xa0 [ 2889.940473] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 2889.945348] blk_mq_alloc_rqs+0x2f4/0xa30 [ 2889.949543] ? rcu_read_lock_sched_held+0x110/0x130 [ 2889.954779] ? blk_mq_alloc_rq_map+0x200/0x200 [ 2889.959383] ? kasan_kmalloc+0x9/0x10 [ 2889.963197] ? __kmalloc_node+0x4e/0x70 [ 2889.967189] ? blk_mq_alloc_rq_map+0x12f/0x200 [ 2889.971795] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 2889.976389] ? kasan_kmalloc+0x9/0x10 [ 2889.980204] blk_mq_alloc_tag_set+0x857/0xf00 [ 2889.984729] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2889.989937] ? __fget+0x472/0x710 [ 2889.993418] loop_add+0x2dc/0xa30 [ 2889.997986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2889.998009] ? loop_queue_rq+0x730/0x730 [ 2890.007629] ? rcu_read_unlock_special+0x380/0x380 [ 2890.012593] loop_control_ioctl+0x286/0x470 [ 2890.016934] ? loop_add+0xa30/0xa30 [ 2890.020601] ? iterate_fd+0x4b0/0x4b0 [ 2890.020625] ? loop_add+0xa30/0xa30 [ 2890.020642] do_vfs_ioctl+0x107b/0x17d0 [ 2890.020662] ? memset+0x32/0x40 [ 2890.020681] ? ioctl_preallocate+0x2f0/0x2f0 [ 2890.020699] ? smack_inode_setattr+0x290/0x290 [ 2890.020715] ? __fget_light+0x2db/0x420 [ 2890.020741] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2890.020759] ? fput+0x128/0x1a0 [ 2890.020775] ? do_syscall_64+0x8c/0x800 [ 2890.020791] ? do_syscall_64+0x8c/0x800 [ 2890.020811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2890.020829] ? security_file_ioctl+0x93/0xc0 [ 2890.020850] ksys_ioctl+0xab/0xd0 [ 2890.020871] __x64_sys_ioctl+0x73/0xb0 [ 2890.020890] do_syscall_64+0x1a3/0x800 [ 2890.020910] ? syscall_return_slowpath+0x5f0/0x5f0 03:41:24 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000340)={0x7, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000380)={r1, 0x2}) r2 = socket$inet(0x2, 0xd, 0x100000) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) pwritev(r2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x1000}], 0x1, 0x0) recvfrom$rose(r4, &(0x7f0000000200)=""/87, 0x57, 0x2, &(0x7f0000000180)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) sendto$inet(r2, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r2, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) sendfile(r3, r4, &(0x7f0000000280)=0x22, 0x0) 03:41:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2890.020928] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2890.020946] ? __switch_to_asm+0x34/0x70 [ 2890.020969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2890.020995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2890.021007] RIP: 0033:0x457ec9 [ 2890.021022] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2890.021031] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:41:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x218, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2890.021057] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2890.128145] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2890.133280] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2890.133290] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2890.133305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2890.133315] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x400000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:24 executing program 4 (fault-call:2 fault-nth:10): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x77, "9b26492423b4f71e019009cabb884097fa090b08ebebce37b87c61ce12e99b39c0d7cba182f1dd2ecb2c8ee286df2967c040b39a524e18e18d8b4286becdc4b4085d3c27a0af5bd41b898086eb406faebdc6265ac141cb620b8598798379ddd4f8065761622c8bd790001f5044ad4a915464ff45ec5197"}, &(0x7f0000000200)=0x7f) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x9, 0x7f}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r1, 0xfe, 0x1, 0xa0, 0x8c, 0x6000000000000, 0x2, 0x400, {r2, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0xffffffff94d911e7, 0x8, 0x10001, 0x1}}, &(0x7f0000000380)=0xb0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000040090000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2890.303644] input: syz1 as /devices/virtual/input/input4824 [ 2890.338445] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x240, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2890.378886] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2890.406663] input: syz1 as /devices/virtual/input/input4825 03:41:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x500000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:25 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) accept$packet(r0, 0x0, &(0x7f0000000140)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2890.488100] FAULT_INJECTION: forcing a failure. [ 2890.488100] name failslab, interval 1, probability 0, space 0, times 0 [ 2890.528084] CPU: 0 PID: 28166 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2890.535328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2890.544695] Call Trace: [ 2890.547313] dump_stack+0x1db/0x2d0 [ 2890.550969] ? dump_stack_print_info.cold+0x20/0x20 [ 2890.556024] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2890.561421] should_fail.cold+0xa/0x15 [ 2890.565329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2890.570463] ? ___might_sleep+0x1e7/0x310 [ 2890.574631] ? arch_local_save_flags+0x50/0x50 [ 2890.579315] ? lockdep_init_map+0x10c/0x5b0 [ 2890.583655] __should_failslab+0x121/0x190 [ 2890.587907] should_failslab+0x9/0x14 [ 2890.591718] kmem_cache_alloc_node+0x265/0x710 [ 2890.596312] ? psi_task_change.cold+0x1ec/0x1ec [ 2890.601019] blk_alloc_queue_node+0xa8/0x920 [ 2890.605447] ? kasan_kmalloc+0x9/0x10 [ 2890.609268] ? blk_set_queue_dying+0x70/0x70 [ 2890.613686] ? blk_mq_alloc_tag_set+0xaaf/0xf00 [ 2890.618380] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2890.623585] ? __fget+0x472/0x710 [ 2890.627057] blk_mq_init_queue+0x4a/0xb0 [ 2890.631138] loop_add+0x35e/0xa30 [ 2890.634600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2890.640150] ? loop_queue_rq+0x730/0x730 [ 2890.644229] ? rcu_read_unlock_special+0x380/0x380 [ 2890.649194] loop_control_ioctl+0x286/0x470 [ 2890.653791] ? loop_add+0xa30/0xa30 [ 2890.657433] ? iterate_fd+0x4b0/0x4b0 [ 2890.661253] ? loop_add+0xa30/0xa30 [ 2890.664892] do_vfs_ioctl+0x107b/0x17d0 [ 2890.668884] ? memset+0x32/0x40 [ 2890.672185] ? ioctl_preallocate+0x2f0/0x2f0 [ 2890.676611] ? smack_inode_setattr+0x290/0x290 [ 2890.681204] ? __fget_light+0x2db/0x420 03:41:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x300, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2890.685197] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2890.690743] ? fput+0x128/0x1a0 [ 2890.694035] ? do_syscall_64+0x8c/0x800 [ 2890.698055] ? do_syscall_64+0x8c/0x800 [ 2890.702055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2890.707612] ? security_file_ioctl+0x93/0xc0 [ 2890.712144] ksys_ioctl+0xab/0xd0 [ 2890.715616] __x64_sys_ioctl+0x73/0xb0 [ 2890.719520] do_syscall_64+0x1a3/0x800 [ 2890.723420] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2890.728361] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2890.733385] ? __switch_to_asm+0x34/0x70 [ 2890.737458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2890.742306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2890.747496] RIP: 0033:0x457ec9 [ 2890.750701] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2890.769615] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2890.777340] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2890.784619] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2890.791900] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2890.799187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2890.806475] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000200000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:25 executing program 4 (fault-call:2 fault-nth:11): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3e8, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x600000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2890.890132] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2890.909443] input: syz1 as /devices/virtual/input/input4826 [ 2890.922287] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2890.969173] input: syz1 as /devices/virtual/input/input4827 [ 2891.016205] FAULT_INJECTION: forcing a failure. [ 2891.016205] name failslab, interval 1, probability 0, space 0, times 0 [ 2891.032033] CPU: 0 PID: 28186 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2891.039264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2891.048626] Call Trace: [ 2891.051234] dump_stack+0x1db/0x2d0 [ 2891.054871] ? dump_stack_print_info.cold+0x20/0x20 [ 2891.059934] should_fail.cold+0xa/0x15 [ 2891.063939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2891.069075] ? ___might_sleep+0x1e7/0x310 [ 2891.073243] ? arch_local_save_flags+0x50/0x50 [ 2891.077851] __should_failslab+0x121/0x190 [ 2891.082095] should_failslab+0x9/0x14 [ 2891.085907] kmem_cache_alloc_node_trace+0x270/0x720 [ 2891.091036] ? __init_waitqueue_head+0x92/0x150 [ 2891.095712] ? init_wait_entry+0x1c0/0x1c0 [ 2891.100057] __kmalloc_node+0x3d/0x70 [ 2891.103870] ? mempool_alloc+0x500/0x500 [ 2891.107951] ? mempool_free+0x380/0x380 [ 2891.111933] mempool_init_node+0x138/0x560 [ 2891.116191] ? mempool_alloc+0x500/0x500 [ 2891.120262] ? mempool_free+0x380/0x380 [ 2891.124245] mempool_init+0x3d/0x50 [ 2891.127888] bioset_init+0x3dc/0x820 [ 2891.131615] ? bioset_exit+0x310/0x310 [ 2891.135533] blk_alloc_queue_node+0x1ee/0x920 [ 2891.140036] ? kasan_kmalloc+0x9/0x10 [ 2891.143849] ? blk_set_queue_dying+0x70/0x70 [ 2891.148284] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2891.153484] ? __fget+0x472/0x710 [ 2891.156958] blk_mq_init_queue+0x4a/0xb0 [ 2891.161053] loop_add+0x35e/0xa30 [ 2891.164519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2891.170081] ? loop_queue_rq+0x730/0x730 [ 2891.174153] ? rcu_read_unlock_special+0x380/0x380 [ 2891.179110] loop_control_ioctl+0x286/0x470 [ 2891.183438] ? loop_add+0xa30/0xa30 [ 2891.187080] ? iterate_fd+0x4b0/0x4b0 [ 2891.190891] ? loop_add+0xa30/0xa30 [ 2891.194531] do_vfs_ioctl+0x107b/0x17d0 [ 2891.198625] ? memset+0x32/0x40 [ 2891.201918] ? ioctl_preallocate+0x2f0/0x2f0 [ 2891.206344] ? smack_inode_setattr+0x290/0x290 [ 2891.211026] ? __fget_light+0x2db/0x420 [ 2891.215016] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2891.220563] ? fput+0x128/0x1a0 [ 2891.223850] ? do_syscall_64+0x8c/0x800 [ 2891.227834] ? do_syscall_64+0x8c/0x800 [ 2891.231821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2891.237388] ? security_file_ioctl+0x93/0xc0 [ 2891.241810] ksys_ioctl+0xab/0xd0 [ 2891.245279] __x64_sys_ioctl+0x73/0xb0 [ 2891.249189] do_syscall_64+0x1a3/0x800 [ 2891.253094] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2891.258034] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2891.263083] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2891.267951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2891.273140] RIP: 0033:0x457ec9 [ 2891.276334] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2891.295249] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2891.302971] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2891.310257] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2891.317538] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2891.324816] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2891.332097] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:25 executing program 4 (fault-call:2 fault-nth:12): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x500, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000140)) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000240)=r2) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000003f0000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:26 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2891.417521] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2891.453691] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x700000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2891.540854] FAULT_INJECTION: forcing a failure. [ 2891.540854] name failslab, interval 1, probability 0, space 0, times 0 [ 2891.581689] CPU: 0 PID: 28197 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2891.588929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2891.598297] Call Trace: [ 2891.600926] dump_stack+0x1db/0x2d0 [ 2891.604600] ? dump_stack_print_info.cold+0x20/0x20 [ 2891.609677] should_fail.cold+0xa/0x15 [ 2891.613595] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2891.618729] ? ___might_sleep+0x1e7/0x310 [ 2891.622911] ? arch_local_save_flags+0x50/0x50 [ 2891.627550] __should_failslab+0x121/0x190 [ 2891.631798] should_failslab+0x9/0x14 [ 2891.635619] kmem_cache_alloc_node_trace+0x270/0x720 [ 2891.640740] ? __init_waitqueue_head+0x92/0x150 [ 2891.645420] ? init_wait_entry+0x1c0/0x1c0 [ 2891.649668] __kmalloc_node+0x3d/0x70 [ 2891.653567] ? mempool_alloc+0x500/0x500 [ 2891.657639] ? mempool_free+0x380/0x380 [ 2891.661641] mempool_init_node+0x138/0x560 [ 2891.665911] ? mempool_alloc+0x500/0x500 [ 2891.670003] ? mempool_free+0x380/0x380 [ 2891.674000] mempool_init+0x3d/0x50 [ 2891.677659] bioset_init+0x3dc/0x820 [ 2891.681396] ? bioset_exit+0x310/0x310 [ 2891.685313] blk_alloc_queue_node+0x1ee/0x920 [ 2891.689815] ? kasan_kmalloc+0x9/0x10 [ 2891.693634] ? blk_set_queue_dying+0x70/0x70 [ 2891.698072] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2891.703274] ? __fget+0x472/0x710 [ 2891.706745] blk_mq_init_queue+0x4a/0xb0 [ 2891.710819] loop_add+0x35e/0xa30 [ 2891.714285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2891.719845] ? loop_queue_rq+0x730/0x730 [ 2891.723933] ? rcu_read_unlock_special+0x380/0x380 [ 2891.728896] loop_control_ioctl+0x286/0x470 [ 2891.733237] ? loop_add+0xa30/0xa30 [ 2891.736880] ? iterate_fd+0x4b0/0x4b0 [ 2891.740742] ? loop_add+0xa30/0xa30 [ 2891.744377] do_vfs_ioctl+0x107b/0x17d0 [ 2891.748369] ? memset+0x32/0x40 [ 2891.751658] ? ioctl_preallocate+0x2f0/0x2f0 [ 2891.756080] ? smack_inode_setattr+0x290/0x290 [ 2891.760676] ? __fget_light+0x2db/0x420 [ 2891.764674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2891.770222] ? fput+0x128/0x1a0 [ 2891.773508] ? do_syscall_64+0x8c/0x800 [ 2891.777491] ? do_syscall_64+0x8c/0x800 [ 2891.781477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2891.787027] ? security_file_ioctl+0x93/0xc0 [ 2891.791448] ksys_ioctl+0xab/0xd0 [ 2891.794910] __x64_sys_ioctl+0x73/0xb0 [ 2891.798790] do_syscall_64+0x1a3/0x800 [ 2891.802790] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2891.807822] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2891.812855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2891.817730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2891.822927] RIP: 0033:0x457ec9 [ 2891.826130] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2891.845053] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2891.852778] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2891.860051] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2891.867323] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2891.874604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 03:41:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x600, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000180)=0x1c) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x5, {{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x224}}, {{0xa, 0x4e21, 0xede, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}}, 0x108) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x101, 0x301400) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) [ 2891.881894] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2891.897605] input: syz1 as /devices/virtual/input/input4828 03:41:26 executing program 4 (fault-call:2 fault-nth:13): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000009400000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2891.939287] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2891.968011] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:26 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x2000000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2892.098450] FAULT_INJECTION: forcing a failure. [ 2892.098450] name failslab, interval 1, probability 0, space 0, times 0 [ 2892.125073] CPU: 0 PID: 28217 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2892.132315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2892.141679] Call Trace: [ 2892.144287] dump_stack+0x1db/0x2d0 [ 2892.147934] ? dump_stack_print_info.cold+0x20/0x20 [ 2892.153491] ? do_syscall_64+0x1a3/0x800 [ 2892.157571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2892.162947] ? mempool_init+0x3d/0x50 [ 2892.166760] ? print_usage_bug+0xd0/0xd0 [ 2892.170843] should_fail.cold+0xa/0x15 [ 2892.174755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2892.179889] ? ___might_sleep+0x1e7/0x310 [ 2892.184052] ? arch_local_save_flags+0x50/0x50 [ 2892.188660] __should_failslab+0x121/0x190 [ 2892.192908] should_failslab+0x9/0x14 [ 2892.196720] kmem_cache_alloc+0x2be/0x710 [ 2892.200892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2892.206438] ? __phys_addr+0xa4/0x120 [ 2892.210253] ? mempool_init+0x3d/0x50 [ 2892.214066] mempool_alloc_slab+0x47/0x60 [ 2892.218216] ? mempool_alloc+0x500/0x500 [ 2892.222285] mempool_init_node+0x2e1/0x560 [ 2892.226535] ? mempool_alloc+0x500/0x500 [ 2892.230604] ? mempool_free+0x380/0x380 [ 2892.234587] mempool_init+0x3d/0x50 [ 2892.238236] bioset_init+0x3dc/0x820 [ 2892.241968] ? bioset_exit+0x310/0x310 [ 2892.245894] blk_alloc_queue_node+0x1ee/0x920 [ 2892.250402] ? kasan_kmalloc+0x9/0x10 [ 2892.254220] ? blk_set_queue_dying+0x70/0x70 [ 2892.258662] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2892.258686] blk_mq_init_queue+0x4a/0xb0 [ 2892.258704] loop_add+0x35e/0xa30 [ 2892.258719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2892.258737] ? loop_queue_rq+0x730/0x730 [ 2892.258764] loop_control_ioctl+0x286/0x470 [ 2892.258781] ? loop_add+0xa30/0xa30 [ 2892.258802] ? iterate_fd+0x4b0/0x4b0 [ 2892.271494] ? loop_add+0xa30/0xa30 [ 2892.271513] do_vfs_ioctl+0x107b/0x17d0 [ 2892.271530] ? memset+0x32/0x40 [ 2892.271546] ? ioctl_preallocate+0x2f0/0x2f0 [ 2892.289052] ? smack_inode_setattr+0x290/0x290 [ 2892.289070] ? __fget_light+0x2db/0x420 [ 2892.289099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2892.303741] ? fput+0x128/0x1a0 [ 2892.303761] ? do_syscall_64+0x8c/0x800 [ 2892.303777] ? do_syscall_64+0x8c/0x800 [ 2892.303795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2892.303813] ? security_file_ioctl+0x93/0xc0 [ 2892.303831] ksys_ioctl+0xab/0xd0 [ 2892.303862] __x64_sys_ioctl+0x73/0xb0 [ 2892.303878] do_syscall_64+0x1a3/0x800 [ 2892.303894] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2892.303909] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2892.303929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2892.303956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2892.303969] RIP: 0033:0x457ec9 [ 2892.303985] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:41:26 executing program 4 (fault-call:2 fault-nth:14): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = geteuid() close(r0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0xfffffffffffffffa, 0x4}, {0x5, 0x400}], r1}, 0x18, 0x2) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x63, 0x200001) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x1, 0x0) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f00000002c0)) sendto(r0, &(0x7f0000000080)='\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0) 03:41:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x700, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2892.303993] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2892.312336] input: syz1 as /devices/virtual/input/input4829 [ 2892.312976] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2892.312986] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2892.312995] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2892.313004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2892.313013] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2892.463912] input: syz1 as /devices/virtual/input/input4830 03:41:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000400300001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2892.559632] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2892.585930] FAULT_INJECTION: forcing a failure. [ 2892.585930] name failslab, interval 1, probability 0, space 0, times 0 [ 2892.613658] CPU: 0 PID: 28228 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2892.620891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2892.630253] Call Trace: [ 2892.632862] dump_stack+0x1db/0x2d0 [ 2892.636504] ? dump_stack_print_info.cold+0x20/0x20 [ 2892.641530] ? loop_control_ioctl+0x286/0x470 [ 2892.646033] ? do_vfs_ioctl+0x107b/0x17d0 [ 2892.650193] ? ksys_ioctl+0xab/0xd0 [ 2892.653836] ? __x64_sys_ioctl+0x73/0xb0 [ 2892.657906] ? do_syscall_64+0x1a3/0x800 [ 2892.661989] should_fail.cold+0xa/0x15 [ 2892.665890] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2892.671016] ? ___might_sleep+0x1e7/0x310 [ 2892.675175] ? arch_local_save_flags+0x50/0x50 [ 2892.679781] __should_failslab+0x121/0x190 [ 2892.684038] should_failslab+0x9/0x14 [ 2892.687848] kmem_cache_alloc_node_trace+0x270/0x720 [ 2892.692963] ? __init_waitqueue_head+0x92/0x150 [ 2892.697645] ? init_wait_entry+0x1c0/0x1c0 [ 2892.701901] __kmalloc_node+0x3d/0x70 [ 2892.705710] ? mempool_alloc+0x500/0x500 [ 2892.709784] ? mempool_free+0x380/0x380 03:41:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='>\xa8\x98hybqe33\xaa\xace\x1f\xca\xf1\xb5r\xad\xb5\xf2-\xb0C\xcf*\x99}>\xbd\x1b\xbe%\x19Nd\b\x02%NPq^ma\xf2\xa4\xbf\x1cT1St\xa6\xe5\x8c\xd6\xa5T\xd2\x13\xea\\7P\"e\xd7\x06\xee\xcc\x85\xdb\xecB|\x86\x1c\xeb\xca0\xe8\x14K\"Q\xc3Z', 0x58) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2892.713777] mempool_init_node+0x138/0x560 [ 2892.718038] ? mempool_alloc+0x500/0x500 [ 2892.722113] ? mempool_free+0x380/0x380 [ 2892.726103] mempool_init+0x3d/0x50 [ 2892.729750] bioset_init+0x635/0x820 [ 2892.733481] ? bioset_exit+0x310/0x310 [ 2892.737393] blk_alloc_queue_node+0x1ee/0x920 [ 2892.741900] ? kasan_kmalloc+0x9/0x10 [ 2892.745716] ? blk_set_queue_dying+0x70/0x70 [ 2892.750158] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2892.755362] ? __fget+0x472/0x710 [ 2892.758846] blk_mq_init_queue+0x4a/0xb0 [ 2892.762919] loop_add+0x35e/0xa30 [ 2892.766378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2892.771935] ? loop_queue_rq+0x730/0x730 [ 2892.776007] ? rcu_read_unlock_special+0x380/0x380 [ 2892.780961] loop_control_ioctl+0x286/0x470 [ 2892.785298] ? loop_add+0xa30/0xa30 [ 2892.788945] ? iterate_fd+0x4b0/0x4b0 [ 2892.792763] ? loop_add+0xa30/0xa30 [ 2892.796495] do_vfs_ioctl+0x107b/0x17d0 [ 2892.800487] ? memset+0x32/0x40 [ 2892.803778] ? ioctl_preallocate+0x2f0/0x2f0 [ 2892.808208] ? smack_inode_setattr+0x290/0x290 03:41:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xa00, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2892.812815] ? __fget_light+0x2db/0x420 [ 2892.816826] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2892.822385] ? fput+0x128/0x1a0 [ 2892.825686] ? do_syscall_64+0x8c/0x800 [ 2892.829675] ? do_syscall_64+0x8c/0x800 [ 2892.833659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2892.839208] ? security_file_ioctl+0x93/0xc0 [ 2892.843637] ksys_ioctl+0xab/0xd0 [ 2892.847111] __x64_sys_ioctl+0x73/0xb0 [ 2892.851015] do_syscall_64+0x1a3/0x800 [ 2892.854934] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2892.859891] ? prepare_exit_to_usermode+0x232/0x3b0 03:41:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2892.864930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2892.869814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2892.875019] RIP: 0033:0x457ec9 [ 2892.878230] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2892.897182] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2892.904908] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2892.912194] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2892.919477] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2892.926763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2892.934082] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2892.952087] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe00, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x6000000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:27 executing program 4 (fault-call:2 fault-nth:15): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000034000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2893.090876] input: syz1 as /devices/virtual/input/input4831 03:41:27 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000200)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x682403, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) bind$bt_hci(r2, &(0x7f0000000440)={0x1f, r3, 0x1}, 0xc) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) sendto(r1, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2893.142781] input: syz1 as /devices/virtual/input/input4832 [ 2893.166092] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x1802, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2893.209484] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2893.222723] FAULT_INJECTION: forcing a failure. [ 2893.222723] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.248020] CPU: 1 PID: 28253 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2893.255244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2893.255252] Call Trace: [ 2893.255276] dump_stack+0x1db/0x2d0 [ 2893.255296] ? dump_stack_print_info.cold+0x20/0x20 [ 2893.275866] ? loop_control_ioctl+0x286/0x470 [ 2893.280366] ? do_vfs_ioctl+0x107b/0x17d0 [ 2893.284530] ? ksys_ioctl+0xab/0xd0 [ 2893.288153] ? __x64_sys_ioctl+0x73/0xb0 [ 2893.288171] ? do_syscall_64+0x1a3/0x800 [ 2893.288200] should_fail.cold+0xa/0x15 [ 2893.288219] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2893.296324] ? ___might_sleep+0x1e7/0x310 [ 2893.296343] ? arch_local_save_flags+0x50/0x50 [ 2893.296371] __should_failslab+0x121/0x190 [ 2893.305322] should_failslab+0x9/0x14 [ 2893.322030] kmem_cache_alloc_node_trace+0x270/0x720 [ 2893.322050] ? __init_waitqueue_head+0x92/0x150 [ 2893.322065] ? init_wait_entry+0x1c0/0x1c0 [ 2893.322091] __kmalloc_node+0x3d/0x70 [ 2893.339881] ? mempool_alloc+0x500/0x500 [ 2893.343943] ? mempool_free+0x380/0x380 [ 2893.347915] mempool_init_node+0x138/0x560 [ 2893.347941] ? mempool_alloc+0x500/0x500 [ 2893.347956] ? mempool_free+0x380/0x380 [ 2893.347969] mempool_init+0x3d/0x50 [ 2893.347992] bioset_init+0x635/0x820 [ 2893.363837] ? bioset_exit+0x310/0x310 [ 2893.363868] blk_alloc_queue_node+0x1ee/0x920 [ 2893.363885] ? kasan_kmalloc+0x9/0x10 [ 2893.363903] ? blk_set_queue_dying+0x70/0x70 [ 2893.384178] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2893.389377] ? __fget+0x472/0x710 [ 2893.393193] blk_mq_init_queue+0x4a/0xb0 [ 2893.397265] loop_add+0x35e/0xa30 [ 2893.400727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2893.406282] ? loop_queue_rq+0x730/0x730 [ 2893.410349] ? rcu_read_unlock_special+0x380/0x380 [ 2893.415304] loop_control_ioctl+0x286/0x470 [ 2893.419637] ? loop_add+0xa30/0xa30 [ 2893.423275] ? iterate_fd+0x4b0/0x4b0 [ 2893.427088] ? loop_add+0xa30/0xa30 [ 2893.430728] do_vfs_ioctl+0x107b/0x17d0 [ 2893.434725] ? memset+0x32/0x40 [ 2893.438026] ? ioctl_preallocate+0x2f0/0x2f0 [ 2893.442445] ? smack_inode_setattr+0x290/0x290 [ 2893.447031] ? __fget_light+0x2db/0x420 [ 2893.451026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2893.456568] ? fput+0x128/0x1a0 [ 2893.459854] ? do_syscall_64+0x8c/0x800 [ 2893.463837] ? do_syscall_64+0x8c/0x800 [ 2893.467821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2893.473368] ? security_file_ioctl+0x93/0xc0 [ 2893.477790] ksys_ioctl+0xab/0xd0 [ 2893.481256] __x64_sys_ioctl+0x73/0xb0 [ 2893.485154] do_syscall_64+0x1a3/0x800 [ 2893.489051] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2893.493993] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2893.499021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2893.503882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2893.509078] RIP: 0033:0x457ec9 [ 2893.512276] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2893.531179] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2893.538893] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2893.546164] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2893.553438] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:41:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0xfeffff0700000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2893.560709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2893.567988] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:28 executing program 4 (fault-call:2 fault-nth:16): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='nv\x00\xe7\xceg\x05\xd6Nu\x92\x06b\"\'\xe82P\x97\x1a|\xf0\x89\xe4\x0e\x0er\xb8\xe5L\xc3\xa31\x91\xa6\xc2\x9e\xe3=\x0e\x05XK\x02\x16A\xe3h\x92\xb0\x01\xc8NC\xf9\xc8\xef\x93\x00A{\x045\x99\x02\xcc\xc5}\xec\xa2\x91\xb9W\x16K\xc3\xb6\x98\xef\x9f\bL\xb0\xec\xd2#F\xf9\'\xe5\x10\x90\x96\n]_\x8d_\x10\xe2\x1bF\xc5c=}\x06\x01\xdb\x86\t\xacv\xce\xd7>h\xf5g\x8c\xb1\xa8\xf8\xceC\x86g\xcc:\f]\xa9|~\xf3\x04\xb7C:\xc6\x8b\xd5\xde\x19\xc8\xdd\xdd\x92\xee\xfdS\x97\xef\xb97\x16\xb3\xd2\xa5\xce\xado:\xdf@\xf4\xc8q\x83\xbb\x1b\xf7>\x97\x01\xc2n\x85\xeb\xfb\xfb\bY\xda\xd9\x8f\xebP\x90\x93Hj\xf2k\xd7\x82\xd0&\"\x16X)\x80\x89J\xb5>9\xe3\xd1\xa5BK\x9bs\xaeT\\\xdb(W\xb6\x8e\x9aN%\xaa\xf7\xf4\x1f4\xdf ,\x90\xb6O\xf2k?{\x15\xc8q.\xae\xc3\x8f\xda\x14\xfd\x82\xf5\xb5\xb5\xdf\x83\tr\xc8b\x91(\xfc?\xb82A\t\xe6z\xb5\xdf\x1c\xb8\xa4\x13\x1e3vm5\x92\xcdw!\xb1\x87YZ\\\x01\x8a\xc8\xcf?\xd7\xa0FD', 0x256) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000a0008000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2893.712531] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2893.735530] FAULT_INJECTION: forcing a failure. [ 2893.735530] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.765474] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2893.781101] input: syz1 as /devices/virtual/input/input4833 [ 2893.789380] CPU: 1 PID: 28264 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2893.796596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2893.796605] Call Trace: [ 2893.796628] dump_stack+0x1db/0x2d0 [ 2893.796649] ? dump_stack_print_info.cold+0x20/0x20 [ 2893.817326] ? do_syscall_64+0x1a3/0x800 [ 2893.821402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2893.826786] ? mempool_init+0x3d/0x50 [ 2893.830600] ? print_usage_bug+0xd0/0xd0 [ 2893.834674] should_fail.cold+0xa/0x15 [ 2893.838581] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2893.843713] ? ___might_sleep+0x1e7/0x310 [ 2893.847868] ? arch_local_save_flags+0x50/0x50 [ 2893.852503] __should_failslab+0x121/0x190 [ 2893.856758] should_failslab+0x9/0x14 [ 2893.860563] kmem_cache_alloc+0x2be/0x710 [ 2893.864732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2893.870283] ? __phys_addr+0xa4/0x120 [ 2893.874090] ? mempool_init+0x3d/0x50 [ 2893.877909] mempool_alloc_slab+0x47/0x60 [ 2893.882067] ? mempool_alloc+0x500/0x500 [ 2893.886137] mempool_init_node+0x2e1/0x560 [ 2893.890388] ? mempool_alloc+0x500/0x500 [ 2893.894456] ? mempool_free+0x380/0x380 [ 2893.898440] mempool_init+0x3d/0x50 [ 2893.902086] bioset_init+0x635/0x820 [ 2893.905817] ? bioset_exit+0x310/0x310 [ 2893.909734] blk_alloc_queue_node+0x1ee/0x920 [ 2893.914240] ? kasan_kmalloc+0x9/0x10 [ 2893.918057] ? blk_set_queue_dying+0x70/0x70 [ 2893.922496] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2893.927707] ? __fget+0x472/0x710 [ 2893.931174] blk_mq_init_queue+0x4a/0xb0 [ 2893.935254] loop_add+0x35e/0xa30 [ 2893.938736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2893.944288] ? loop_queue_rq+0x730/0x730 [ 2893.948389] ? rcu_read_unlock_special+0x380/0x380 [ 2893.953433] loop_control_ioctl+0x286/0x470 [ 2893.957772] ? loop_add+0xa30/0xa30 [ 2893.961414] ? iterate_fd+0x4b0/0x4b0 [ 2893.965225] ? loop_add+0xa30/0xa30 [ 2893.968858] do_vfs_ioctl+0x107b/0x17d0 [ 2893.972846] ? memset+0x32/0x40 [ 2893.976133] ? ioctl_preallocate+0x2f0/0x2f0 [ 2893.980550] ? smack_inode_setattr+0x290/0x290 [ 2893.985145] ? __fget_light+0x2db/0x420 [ 2893.989142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2893.994698] ? fput+0x128/0x1a0 [ 2893.998008] ? do_syscall_64+0x8c/0x800 [ 2894.001988] ? do_syscall_64+0x8c/0x800 [ 2894.005983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2894.011532] ? security_file_ioctl+0x93/0xc0 [ 2894.015951] ksys_ioctl+0xab/0xd0 [ 2894.019415] __x64_sys_ioctl+0x73/0xb0 [ 2894.023316] do_syscall_64+0x1a3/0x800 [ 2894.027212] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2894.032148] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2894.037181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2894.042039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.047232] RIP: 0033:0x457ec9 03:41:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0xff00000000000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2894.050429] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2894.069338] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2894.077063] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2894.084356] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2894.091629] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2894.098901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2894.106178] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x2000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:28 executing program 4 (fault-call:2 fault-nth:17): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2894.121622] input: syz1 as /devices/virtual/input/input4834 [ 2894.231500] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = dup3(r0, r0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x173a2be0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000200)={r2, 0xc2}, &(0x7f0000000240)=0x8) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000580), 0x1) close(r4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000480)={r3, 0xcc, &(0x7f0000000380)=[@in6={0xa, 0x4e21, 0x8001, @remote, 0x101}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e21, 0x400, @ipv4={[], [], @rand_addr=0x1}, 0x3}, @in6={0xa, 0x4e24, 0x100, @loopback, 0x1}, @in6={0xa, 0x4e21, 0x100, @empty, 0x5}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x25}}, @in6={0xa, 0x4e22, 0x20e2, @empty, 0x7}]}, &(0x7f00000004c0)=0x10) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000500), &(0x7f0000000540)=0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0xfffffffffffffffd, 0x0, 0x2eb) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r1, 0x28, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={r6, 0x9}, 0xc) 03:41:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000001001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3c00, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0xffffffff00000000, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2894.339908] FAULT_INJECTION: forcing a failure. [ 2894.339908] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.353859] CPU: 1 PID: 28280 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2894.361093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2894.370457] Call Trace: [ 2894.373063] dump_stack+0x1db/0x2d0 [ 2894.376722] ? dump_stack_print_info.cold+0x20/0x20 [ 2894.381741] ? do_syscall_64+0x1a3/0x800 [ 2894.385808] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.391179] ? mempool_init+0x3d/0x50 [ 2894.394989] ? print_usage_bug+0xd0/0xd0 [ 2894.399061] should_fail.cold+0xa/0x15 [ 2894.402958] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2894.408072] ? ___might_sleep+0x1e7/0x310 [ 2894.412222] ? arch_local_save_flags+0x50/0x50 [ 2894.416825] __should_failslab+0x121/0x190 [ 2894.421067] should_failslab+0x9/0x14 [ 2894.424872] kmem_cache_alloc+0x2be/0x710 [ 2894.429024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2894.434581] ? __phys_addr+0xa4/0x120 [ 2894.438387] ? mempool_init+0x3d/0x50 [ 2894.442200] mempool_alloc_slab+0x47/0x60 [ 2894.446351] ? mempool_alloc+0x500/0x500 [ 2894.450415] mempool_init_node+0x2e1/0x560 [ 2894.454672] ? mempool_alloc+0x500/0x500 [ 2894.458737] ? mempool_free+0x380/0x380 [ 2894.462713] mempool_init+0x3d/0x50 [ 2894.466351] bioset_init+0x635/0x820 [ 2894.470076] ? bioset_exit+0x310/0x310 [ 2894.473985] blk_alloc_queue_node+0x1ee/0x920 [ 2894.478481] ? kasan_kmalloc+0x9/0x10 [ 2894.482287] ? blk_set_queue_dying+0x70/0x70 [ 2894.486715] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2894.491907] ? __fget+0x472/0x710 [ 2894.495367] blk_mq_init_queue+0x4a/0xb0 [ 2894.499441] loop_add+0x35e/0xa30 [ 2894.502894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2894.508444] ? loop_queue_rq+0x730/0x730 [ 2894.512506] ? rcu_read_unlock_special+0x380/0x380 [ 2894.517452] loop_control_ioctl+0x286/0x470 [ 2894.521781] ? loop_add+0xa30/0xa30 [ 2894.525434] ? iterate_fd+0x4b0/0x4b0 [ 2894.529245] ? loop_add+0xa30/0xa30 [ 2894.532873] do_vfs_ioctl+0x107b/0x17d0 [ 2894.536856] ? memset+0x32/0x40 [ 2894.540140] ? ioctl_preallocate+0x2f0/0x2f0 [ 2894.544551] ? smack_inode_setattr+0x290/0x290 [ 2894.549134] ? __fget_light+0x2db/0x420 [ 2894.553122] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2894.558780] ? fput+0x128/0x1a0 [ 2894.562063] ? do_syscall_64+0x8c/0x800 [ 2894.566041] ? do_syscall_64+0x8c/0x800 [ 2894.570022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2894.575568] ? security_file_ioctl+0x93/0xc0 [ 2894.580089] ksys_ioctl+0xab/0xd0 [ 2894.583555] __x64_sys_ioctl+0x73/0xb0 [ 2894.587449] do_syscall_64+0x1a3/0x800 [ 2894.591347] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2894.596283] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2894.601310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2894.606172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2894.611362] RIP: 0033:0x457ec9 [ 2894.614564] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2894.633463] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:41:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2894.641171] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2894.648442] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2894.655796] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2894.663065] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2894.670333] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:29 executing program 4 (fault-call:2 fault-nth:18): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3f00, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2894.795808] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2894.807808] input: syz1 as /devices/virtual/input/input4835 [ 2894.832697] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffeffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000002001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2894.865793] input: syz1 as /devices/virtual/input/input4836 [ 2894.917012] FAULT_INJECTION: forcing a failure. [ 2894.917012] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.951486] CPU: 0 PID: 28296 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 03:41:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000200)={0x100000001, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}, {{0x2, 0x4e21, @broadcast}}}, 0x108) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2894.959960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2894.969324] Call Trace: [ 2894.971943] dump_stack+0x1db/0x2d0 [ 2894.975610] ? dump_stack_print_info.cold+0x20/0x20 [ 2894.980654] ? __lock_is_held+0xb6/0x140 [ 2894.984751] should_fail.cold+0xa/0x15 [ 2894.988677] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2894.993807] ? ___might_sleep+0x1e7/0x310 [ 2894.997952] ? arch_local_save_flags+0x50/0x50 [ 2895.002541] __should_failslab+0x121/0x190 [ 2895.006789] should_failslab+0x9/0x14 [ 2895.010709] kmem_cache_alloc_node_trace+0x270/0x720 [ 2895.015849] bdi_alloc_node+0x8a/0x100 [ 2895.019766] blk_alloc_queue_node+0x21b/0x920 [ 2895.024279] ? kasan_kmalloc+0x9/0x10 [ 2895.028133] ? blk_set_queue_dying+0x70/0x70 [ 2895.032590] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2895.037816] ? __fget+0x472/0x710 [ 2895.041289] blk_mq_init_queue+0x4a/0xb0 [ 2895.045365] loop_add+0x35e/0xa30 [ 2895.048832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2895.054394] ? loop_queue_rq+0x730/0x730 [ 2895.058467] ? rcu_read_unlock_special+0x380/0x380 [ 2895.063429] loop_control_ioctl+0x286/0x470 [ 2895.067769] ? loop_add+0xa30/0xa30 [ 2895.071414] ? iterate_fd+0x4b0/0x4b0 [ 2895.075233] ? loop_add+0xa30/0xa30 [ 2895.078884] do_vfs_ioctl+0x107b/0x17d0 [ 2895.082886] ? memset+0x32/0x40 [ 2895.086176] ? ioctl_preallocate+0x2f0/0x2f0 [ 2895.090610] ? smack_inode_setattr+0x290/0x290 [ 2895.095206] ? __fget_light+0x2db/0x420 [ 2895.099208] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2895.104760] ? fput+0x128/0x1a0 [ 2895.108057] ? do_syscall_64+0x8c/0x800 [ 2895.112045] ? do_syscall_64+0x8c/0x800 [ 2895.116034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2895.121594] ? security_file_ioctl+0x93/0xc0 [ 2895.126021] ksys_ioctl+0xab/0xd0 [ 2895.129490] __x64_sys_ioctl+0x73/0xb0 [ 2895.133395] do_syscall_64+0x1a3/0x800 [ 2895.137297] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2895.142242] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2895.147274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2895.152155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2895.157353] RIP: 0033:0x457ec9 [ 2895.160552] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2895.179468] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2895.187188] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2895.194473] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2895.201762] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2895.209042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2895.216321] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x4002, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0xfffffffffffffec5) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:29 executing program 4 (fault-call:2 fault-nth:19): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000004001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2895.325406] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2895.360823] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x4ecd, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2895.446409] input: syz1 as /devices/virtual/input/input4837 [ 2895.476587] FAULT_INJECTION: forcing a failure. [ 2895.476587] name failslab, interval 1, probability 0, space 0, times 0 [ 2895.504589] input: syz1 as /devices/virtual/input/input4838 [ 2895.514503] CPU: 1 PID: 28319 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2895.521737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2895.531093] Call Trace: [ 2895.533699] dump_stack+0x1db/0x2d0 [ 2895.537347] ? dump_stack_print_info.cold+0x20/0x20 [ 2895.542370] ? lockdep_init_map+0x10c/0x5b0 [ 2895.546974] should_fail.cold+0xa/0x15 [ 2895.550870] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2895.555992] ? ___might_sleep+0x1e7/0x310 [ 2895.560149] ? arch_local_save_flags+0x50/0x50 [ 2895.564740] ? lockdep_init_map+0x10c/0x5b0 [ 2895.569074] __should_failslab+0x121/0x190 [ 2895.573325] should_failslab+0x9/0x14 [ 2895.577129] kmem_cache_alloc_trace+0x2d1/0x760 [ 2895.581800] ? wb_init+0xa90/0xa90 [ 2895.585364] blk_alloc_queue_stats+0x8e/0x1d0 [ 2895.589863] ? blk_stat_free_callback+0x40/0x40 [ 2895.594540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2895.600090] ? bdi_alloc_node+0xb3/0x100 [ 2895.604162] blk_alloc_queue_node+0x253/0x920 [ 2895.608664] ? kasan_kmalloc+0x9/0x10 [ 2895.612469] ? blk_set_queue_dying+0x70/0x70 [ 2895.616925] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2895.622121] ? __fget+0x472/0x710 [ 2895.625592] blk_mq_init_queue+0x4a/0xb0 [ 2895.629666] loop_add+0x35e/0xa30 [ 2895.633120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2895.638665] ? loop_queue_rq+0x730/0x730 [ 2895.642730] ? rcu_read_unlock_special+0x380/0x380 [ 2895.647681] loop_control_ioctl+0x286/0x470 [ 2895.652008] ? loop_add+0xa30/0xa30 [ 2895.655651] ? iterate_fd+0x4b0/0x4b0 [ 2895.659458] ? loop_add+0xa30/0xa30 [ 2895.663093] do_vfs_ioctl+0x107b/0x17d0 [ 2895.667090] ? memset+0x32/0x40 [ 2895.670378] ? ioctl_preallocate+0x2f0/0x2f0 [ 2895.674793] ? smack_inode_setattr+0x290/0x290 [ 2895.679376] ? __fget_light+0x2db/0x420 [ 2895.683363] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2895.688907] ? fput+0x128/0x1a0 [ 2895.692194] ? do_syscall_64+0x8c/0x800 [ 2895.696176] ? do_syscall_64+0x8c/0x800 [ 2895.700158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2895.705704] ? security_file_ioctl+0x93/0xc0 [ 2895.710119] ksys_ioctl+0xab/0xd0 [ 2895.713588] __x64_sys_ioctl+0x73/0xb0 [ 2895.717485] do_syscall_64+0x1a3/0x800 [ 2895.721380] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2895.726330] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2895.731356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2895.736217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2895.741408] RIP: 0033:0x457ec9 [ 2895.744608] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2895.763509] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2895.771228] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2895.778498] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2895.785776] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2895.793138] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2895.800408] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:30 executing program 4 (fault-call:2 fault-nth:20): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000005001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2895.857116] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xcd4e, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2895.919002] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2896.025027] FAULT_INJECTION: forcing a failure. [ 2896.025027] name failslab, interval 1, probability 0, space 0, times 0 [ 2896.059115] CPU: 0 PID: 28331 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2896.066349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2896.075719] Call Trace: [ 2896.078330] dump_stack+0x1db/0x2d0 [ 2896.081988] ? dump_stack_print_info.cold+0x20/0x20 [ 2896.087026] ? lockdep_init_map+0x10c/0x5b0 [ 2896.091380] should_fail.cold+0xa/0x15 [ 2896.095291] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2896.100511] ? ___might_sleep+0x1e7/0x310 [ 2896.104674] ? arch_local_save_flags+0x50/0x50 [ 2896.109358] ? lockdep_init_map+0x10c/0x5b0 [ 2896.115346] __should_failslab+0x121/0x190 [ 2896.119610] should_failslab+0x9/0x14 [ 2896.124007] kmem_cache_alloc_trace+0x2d1/0x760 [ 2896.128708] ? wb_init+0xa90/0xa90 [ 2896.132265] blk_alloc_queue_stats+0x8e/0x1d0 [ 2896.136779] ? blk_stat_free_callback+0x40/0x40 [ 2896.141460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2896.147017] ? bdi_alloc_node+0xb3/0x100 [ 2896.151097] blk_alloc_queue_node+0x253/0x920 [ 2896.155602] ? kasan_kmalloc+0x9/0x10 [ 2896.159411] ? blk_set_queue_dying+0x70/0x70 [ 2896.163848] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2896.169046] ? __fget+0x472/0x710 [ 2896.172526] blk_mq_init_queue+0x4a/0xb0 [ 2896.176606] loop_add+0x35e/0xa30 [ 2896.180072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2896.185628] ? loop_queue_rq+0x730/0x730 [ 2896.189702] ? rcu_read_unlock_special+0x380/0x380 [ 2896.194661] loop_control_ioctl+0x286/0x470 [ 2896.198999] ? loop_add+0xa30/0xa30 [ 2896.202645] ? iterate_fd+0x4b0/0x4b0 [ 2896.206464] ? loop_add+0xa30/0xa30 [ 2896.210115] do_vfs_ioctl+0x107b/0x17d0 [ 2896.214108] ? memset+0x32/0x40 [ 2896.217407] ? ioctl_preallocate+0x2f0/0x2f0 [ 2896.221825] ? smack_inode_setattr+0x290/0x290 [ 2896.226417] ? __fget_light+0x2db/0x420 [ 2896.230415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2896.235967] ? fput+0x128/0x1a0 [ 2896.239255] ? do_syscall_64+0x8c/0x800 [ 2896.243233] ? do_syscall_64+0x8c/0x800 [ 2896.247221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2896.252795] ? security_file_ioctl+0x93/0xc0 [ 2896.257218] ksys_ioctl+0xab/0xd0 [ 2896.260682] __x64_sys_ioctl+0x73/0xb0 [ 2896.264578] do_syscall_64+0x1a3/0x800 [ 2896.268493] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2896.273436] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2896.278475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2896.283347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2896.288550] RIP: 0033:0x457ec9 [ 2896.291764] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2896.310681] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2896.318499] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2896.325777] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2896.333053] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2896.340329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2896.347613] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe0ff, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:30 executing program 4 (fault-call:2 fault-nth:21): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000008001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:31 executing program 0: r0 = socket$inet(0x2, 0x3, 0x8000000000000000) modify_ldt$write(0x1, &(0x7f0000000140)={0x2, 0x20000800, 0x1000, 0x7f, 0x7, 0x101, 0x4, 0x1c, 0x44, 0x3}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = semget$private(0x0, 0x1, 0x1) semctl$GETVAL(r1, 0x3, 0xc, &(0x7f0000000200)=""/71) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2896.425932] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2896.437636] input: syz1 as /devices/virtual/input/input4839 [ 2896.440082] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe803, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2896.494186] input: syz1 as /devices/virtual/input/input4840 [ 2896.586322] FAULT_INJECTION: forcing a failure. [ 2896.586322] name failslab, interval 1, probability 0, space 0, times 0 [ 2896.636087] CPU: 0 PID: 28351 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2896.643327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2896.652693] Call Trace: [ 2896.655307] dump_stack+0x1db/0x2d0 [ 2896.659046] ? dump_stack_print_info.cold+0x20/0x20 [ 2896.664080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2896.669628] ? check_preemption_disabled+0x48/0x290 [ 2896.674676] should_fail.cold+0xa/0x15 [ 2896.678578] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2896.683706] ? ___might_sleep+0x1e7/0x310 [ 2896.687865] ? arch_local_save_flags+0x50/0x50 [ 2896.692490] __should_failslab+0x121/0x190 [ 2896.696750] should_failslab+0x9/0x14 [ 2896.700563] kmem_cache_alloc_trace+0x2d1/0x760 [ 2896.705246] ? kasan_check_read+0x11/0x20 [ 2896.709408] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2896.714700] ? rcu_read_unlock_special+0x380/0x380 [ 2896.719732] blk_iolatency_init+0x4e/0x2f0 [ 2896.723990] blkcg_init_queue+0x163/0x3d0 [ 2896.728148] blk_alloc_queue_node+0x64f/0x920 [ 2896.732658] ? kasan_kmalloc+0x9/0x10 [ 2896.736480] ? blk_set_queue_dying+0x70/0x70 [ 2896.740918] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2896.746115] ? __fget+0x472/0x710 [ 2896.749583] blk_mq_init_queue+0x4a/0xb0 [ 2896.753657] loop_add+0x35e/0xa30 [ 2896.757119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2896.762668] ? loop_queue_rq+0x730/0x730 [ 2896.766742] ? rcu_read_unlock_special+0x380/0x380 [ 2896.771693] loop_control_ioctl+0x286/0x470 [ 2896.776034] ? loop_add+0xa30/0xa30 [ 2896.779683] ? iterate_fd+0x4b0/0x4b0 [ 2896.783509] ? loop_add+0xa30/0xa30 [ 2896.784501] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2896.787140] do_vfs_ioctl+0x107b/0x17d0 [ 2896.787159] ? memset+0x32/0x40 [ 2896.787175] ? ioctl_preallocate+0x2f0/0x2f0 [ 2896.787191] ? smack_inode_setattr+0x290/0x290 [ 2896.787206] ? __fget_light+0x2db/0x420 [ 2896.787228] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2896.787243] ? fput+0x128/0x1a0 [ 2896.787260] ? do_syscall_64+0x8c/0x800 [ 2896.828319] ? do_syscall_64+0x8c/0x800 [ 2896.832312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2896.837857] ? security_file_ioctl+0x93/0xc0 [ 2896.842281] ksys_ioctl+0xab/0xd0 [ 2896.845753] __x64_sys_ioctl+0x73/0xb0 [ 2896.849651] do_syscall_64+0x1a3/0x800 [ 2896.853566] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2896.858515] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2896.863552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2896.868460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2896.873673] RIP: 0033:0x457ec9 [ 2896.876881] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2896.895791] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2896.903515] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2896.910797] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2896.918087] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2896.925366] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 03:41:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:31 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2896.932642] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:31 executing program 4 (fault-call:2 fault-nth:22): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xf401, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000004009001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:31 executing program 0: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000002c0)=[{{&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)}], 0x1, &(0x7f0000000280)=""/46, 0x2e}, 0x80000000}], 0x1, 0x40000140, &(0x7f0000000340)={r1, r2+10000000}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f0000000380)={0x7d, "627698c2059b095f8853654a7446cd82c03ff2d1a0ef72c69bd80b43ab5a08dd9377deaccda0d7d1f9c6769e1f2292554b03d26db0802c782fc62188dfacc126667bf23794e426c962e36769012f1da26c88674c83476fcdfb20bc4d90c84f90d65010b109f4334f2e3a5ee324ad9cf86c037a611754d95b44d2ab0cda"}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r4, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0xfffffffffffffe57) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r4, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2897.034001] input: syz1 as /devices/virtual/input/input4841 [ 2897.070625] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2897.087653] input: syz0 as /devices/virtual/input/input4842 [ 2897.101195] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xff0f, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2897.207128] FAULT_INJECTION: forcing a failure. [ 2897.207128] name failslab, interval 1, probability 0, space 0, times 0 [ 2897.240959] CPU: 0 PID: 28378 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2897.248212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2897.257574] Call Trace: [ 2897.260179] dump_stack+0x1db/0x2d0 [ 2897.263833] ? dump_stack_print_info.cold+0x20/0x20 [ 2897.268869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2897.274443] ? check_preemption_disabled+0x48/0x290 [ 2897.279835] should_fail.cold+0xa/0x15 [ 2897.283745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2897.288967] ? ___might_sleep+0x1e7/0x310 [ 2897.293143] ? arch_local_save_flags+0x50/0x50 [ 2897.297759] __should_failslab+0x121/0x190 [ 2897.302021] should_failslab+0x9/0x14 [ 2897.305836] kmem_cache_alloc_trace+0x2d1/0x760 [ 2897.310518] ? kasan_check_read+0x11/0x20 [ 2897.314693] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2897.319994] ? rcu_read_unlock_special+0x380/0x380 [ 2897.324952] blk_iolatency_init+0x4e/0x2f0 [ 2897.329211] blkcg_init_queue+0x163/0x3d0 [ 2897.333377] blk_alloc_queue_node+0x64f/0x920 [ 2897.337891] ? kasan_kmalloc+0x9/0x10 [ 2897.341706] ? blk_set_queue_dying+0x70/0x70 [ 2897.346147] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2897.351369] ? __fget+0x472/0x710 03:41:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffe0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2897.354861] blk_mq_init_queue+0x4a/0xb0 [ 2897.358935] loop_add+0x35e/0xa30 [ 2897.362413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2897.367972] ? loop_queue_rq+0x730/0x730 [ 2897.372042] ? rcu_read_unlock_special+0x380/0x380 [ 2897.377003] loop_control_ioctl+0x286/0x470 [ 2897.381339] ? loop_add+0xa30/0xa30 [ 2897.384983] ? iterate_fd+0x4b0/0x4b0 [ 2897.388802] ? loop_add+0xa30/0xa30 [ 2897.392449] do_vfs_ioctl+0x107b/0x17d0 [ 2897.396453] ? memset+0x32/0x40 [ 2897.399742] ? ioctl_preallocate+0x2f0/0x2f0 [ 2897.404155] ? smack_inode_setattr+0x290/0x290 [ 2897.408751] ? __fget_light+0x2db/0x420 [ 2897.412750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2897.418294] ? fput+0x128/0x1a0 [ 2897.421580] ? do_syscall_64+0x8c/0x800 [ 2897.425568] ? do_syscall_64+0x8c/0x800 [ 2897.429550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2897.435100] ? security_file_ioctl+0x93/0xc0 [ 2897.439540] ksys_ioctl+0xab/0xd0 [ 2897.443005] __x64_sys_ioctl+0x73/0xb0 [ 2897.446906] do_syscall_64+0x1a3/0x800 [ 2897.450811] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2897.455758] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2897.460796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2897.465664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2897.470856] RIP: 0033:0x457ec9 [ 2897.474055] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2897.492963] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2897.500681] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 03:41:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000200)={'caif0\x00', 0x4, 0x8000}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x4004000, 0x0, 0x0) [ 2897.507965] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2897.515246] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2897.522523] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2897.529808] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x50000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:32 executing program 4 (fault-call:2 fault-nth:23): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000010001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2897.666113] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2897.677036] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2897.721888] input: syz1 as /devices/virtual/input/input4843 [ 2897.740555] input: syz1 as /devices/virtual/input/input4844 [ 2897.764759] Unknown ioctl 35296 [ 2897.778973] Unknown ioctl 35296 [ 2897.790343] FAULT_INJECTION: forcing a failure. [ 2897.790343] name failslab, interval 1, probability 0, space 0, times 0 [ 2897.802593] CPU: 1 PID: 28401 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2897.809816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2897.819182] Call Trace: [ 2897.821784] dump_stack+0x1db/0x2d0 [ 2897.825436] ? dump_stack_print_info.cold+0x20/0x20 [ 2897.830460] ? __lock_is_held+0xb6/0x140 [ 2897.834544] should_fail.cold+0xa/0x15 [ 2897.838454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2897.843573] ? pcpu_balance_workfn+0x1680/0x1680 [ 2897.843589] ? __lock_is_held+0xb6/0x140 [ 2897.843611] __should_failslab+0x121/0x190 [ 2897.843632] should_failslab+0x9/0x14 [ 2897.860456] kmem_cache_alloc_node_trace+0x5a/0x720 [ 2897.860471] ? lock_release+0xc40/0xc40 [ 2897.860487] ? rwlock_bug.part.0+0x90/0x90 [ 2897.873676] ? trace_hardirqs_on_caller+0x310/0x310 [ 2897.878702] iolatency_pd_alloc+0x8d/0x140 [ 2897.878719] ? blkcg_iolatency_throttle+0x1360/0x1360 [ 2897.878737] blkcg_activate_policy+0x242/0x560 [ 2897.888147] blk_iolatency_init+0x151/0x2f0 [ 2897.888169] blkcg_init_queue+0x163/0x3d0 [ 2897.901194] blk_alloc_queue_node+0x64f/0x920 [ 2897.905691] ? kasan_kmalloc+0x9/0x10 [ 2897.905713] ? blk_set_queue_dying+0x70/0x70 [ 2897.913927] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2897.913940] ? __fget+0x472/0x710 [ 2897.913961] blk_mq_init_queue+0x4a/0xb0 [ 2897.926641] loop_add+0x35e/0xa30 [ 2897.930098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2897.935660] ? loop_queue_rq+0x730/0x730 [ 2897.935677] ? rcu_read_unlock_special+0x380/0x380 [ 2897.935703] loop_control_ioctl+0x286/0x470 [ 2897.948972] ? loop_add+0xa30/0xa30 [ 2897.952613] ? iterate_fd+0x4b0/0x4b0 [ 2897.956428] ? loop_add+0xa30/0xa30 [ 2897.960065] do_vfs_ioctl+0x107b/0x17d0 [ 2897.964050] ? memset+0x32/0x40 [ 2897.967345] ? ioctl_preallocate+0x2f0/0x2f0 [ 2897.971763] ? smack_inode_setattr+0x290/0x290 [ 2897.976368] ? __fget_light+0x2db/0x420 [ 2897.980368] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2897.985913] ? fput+0x128/0x1a0 [ 2897.989204] ? do_syscall_64+0x8c/0x800 [ 2897.993182] ? do_syscall_64+0x8c/0x800 [ 2897.997168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2898.002710] ? security_file_ioctl+0x93/0xc0 [ 2898.007135] ksys_ioctl+0xab/0xd0 [ 2898.010598] __x64_sys_ioctl+0x73/0xb0 [ 2898.014498] do_syscall_64+0x1a3/0x800 [ 2898.018397] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2898.023343] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2898.028382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2898.033239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2898.038432] RIP: 0033:0x457ec9 [ 2898.041630] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:41:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='caif0\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x6}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2898.060534] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2898.068252] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2898.075610] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2898.082882] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2898.090151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2898.097426] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:32 executing program 4 (fault-call:2 fault-nth:24): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x8000a0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000020001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2898.217127] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2898.244214] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x7}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000300)={0x0, {{0xa, 0x4e24, 0x401, @rand_addr="3d6be73f62a1140c773fcbc1303edc8c", 0x1}}, 0x1, 0x5, [{{0xa, 0x4e21, 0x3, @mcast2, 0x5}}, {{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x21}, 0x48b84fc4}}, {{0xa, 0x4e22, 0xcdf6, @rand_addr="4dcadf7d1f10d010a4e8f9adc80020c0", 0x200}}, {{0xa, 0x4e24, 0x8000, @dev={0xfe, 0x80, [], 0x12}, 0x10}}, {{0xa, 0x4e23, 0x7, @mcast1, 0x100000001}}]}, 0x310) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) accept4$netrom(r1, &(0x7f0000000200)={{0x3, @null}, [@bcast, @null, @remote, @remote, @remote, @null, @rose, @netrom]}, &(0x7f0000000180)=0x48, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) fcntl$notify(r1, 0x402, 0x0) 03:41:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x1000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2898.329401] input: syz1 as /devices/virtual/input/input4845 [ 2898.356102] input: syz1 as /devices/virtual/input/input4846 03:41:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000000000003f001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2898.446719] FAULT_INJECTION: forcing a failure. [ 2898.446719] name failslab, interval 1, probability 0, space 0, times 0 [ 2898.493389] CPU: 0 PID: 28419 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2898.500625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2898.509995] Call Trace: [ 2898.512606] dump_stack+0x1db/0x2d0 [ 2898.516252] ? dump_stack_print_info.cold+0x20/0x20 [ 2898.521299] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2898.526430] should_fail.cold+0xa/0x15 [ 2898.530341] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2898.535472] ? ___might_sleep+0x1e7/0x310 03:41:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2898.539633] ? arch_local_save_flags+0x50/0x50 [ 2898.544233] ? __lock_is_held+0xb6/0x140 [ 2898.548317] __should_failslab+0x121/0x190 [ 2898.552575] should_failslab+0x9/0x14 [ 2898.556385] kmem_cache_alloc_node_trace+0x270/0x720 [ 2898.561499] ? init_timer_key+0x1a1/0x4c0 [ 2898.565661] ? blkcg_iolatency_done_bio+0x1bc0/0x1bc0 [ 2898.570865] blk_throtl_init+0xca/0x640 [ 2898.574852] ? blk_throtl_drain+0x6c0/0x6c0 [ 2898.579220] ? blk_iolatency_init+0x18d/0x2f0 [ 2898.583731] blkcg_init_queue+0x277/0x3d0 [ 2898.587896] blk_alloc_queue_node+0x64f/0x920 [ 2898.592404] ? kasan_kmalloc+0x9/0x10 [ 2898.596221] ? blk_set_queue_dying+0x70/0x70 [ 2898.600655] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2898.605859] ? __fget+0x472/0x710 [ 2898.609336] blk_mq_init_queue+0x4a/0xb0 [ 2898.613408] loop_add+0x35e/0xa30 [ 2898.616876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2898.622428] ? loop_queue_rq+0x730/0x730 [ 2898.626493] ? rcu_read_unlock_special+0x380/0x380 [ 2898.631424] loop_control_ioctl+0x286/0x470 [ 2898.635748] ? loop_add+0xa30/0xa30 [ 2898.639398] ? iterate_fd+0x4b0/0x4b0 [ 2898.643214] ? loop_add+0xa30/0xa30 [ 2898.646848] do_vfs_ioctl+0x107b/0x17d0 [ 2898.650838] ? memset+0x32/0x40 [ 2898.654135] ? ioctl_preallocate+0x2f0/0x2f0 [ 2898.658562] ? smack_inode_setattr+0x290/0x290 [ 2898.663155] ? __fget_light+0x2db/0x420 [ 2898.667145] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2898.672688] ? fput+0x128/0x1a0 [ 2898.675973] ? do_syscall_64+0x8c/0x800 [ 2898.679955] ? do_syscall_64+0x8c/0x800 [ 2898.683943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2898.689493] ? security_file_ioctl+0x93/0xc0 03:41:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x2000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2898.693915] ksys_ioctl+0xab/0xd0 [ 2898.697384] __x64_sys_ioctl+0x73/0xb0 [ 2898.701294] do_syscall_64+0x1a3/0x800 [ 2898.705198] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2898.710144] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2898.715167] ? __switch_to_asm+0x34/0x70 [ 2898.719243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2898.724112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2898.729314] RIP: 0033:0x457ec9 [ 2898.732514] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2898.751422] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2898.759141] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2898.766421] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2898.773694] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2898.780969] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 03:41:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x0, @local, 0xf9e}}, 0x0, 0x6, 0x5, 0x1, 0x1}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x4}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x400000, 0xd7011a9ed013c308) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000300)={0x5, 0x17005}) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2898.788240] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:33 executing program 4 (fault-call:2 fault-nth:25): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2898.868208] input: syz1 as /devices/virtual/input/input4847 [ 2898.883736] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000008000a0001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2898.920221] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2898.962388] input: syz1 as /devices/virtual/input/input4848 [ 2898.992871] FAULT_INJECTION: forcing a failure. [ 2898.992871] name failslab, interval 1, probability 0, space 0, times 0 03:41:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000240)=0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='bond0\x00', 0xf) r2 = syz_open_dev$vbi(0x0, 0x2, 0x2) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000280)={0x400, "4e3865e852ea603e611355a312fda4f26580d2d4460fa07c02b356c24fff6305", 0x120, 0x10000, 0xffffffffffffffff, 0x5, 0x4}) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000180)=0x3f, 0x2) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2899.015333] CPU: 0 PID: 28442 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2899.022565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2899.031928] Call Trace: [ 2899.034541] dump_stack+0x1db/0x2d0 [ 2899.038187] ? dump_stack_print_info.cold+0x20/0x20 [ 2899.043225] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2899.048366] should_fail.cold+0xa/0x15 [ 2899.052281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2899.057411] ? ___might_sleep+0x1e7/0x310 [ 2899.061595] ? arch_local_save_flags+0x50/0x50 [ 2899.066189] ? __lock_is_held+0xb6/0x140 [ 2899.070280] __should_failslab+0x121/0x190 [ 2899.074534] should_failslab+0x9/0x14 [ 2899.078343] kmem_cache_alloc_node_trace+0x270/0x720 [ 2899.083458] ? init_timer_key+0x1a1/0x4c0 [ 2899.087621] ? blkcg_iolatency_done_bio+0x1bc0/0x1bc0 [ 2899.092827] blk_throtl_init+0xca/0x640 [ 2899.096819] ? blk_throtl_drain+0x6c0/0x6c0 [ 2899.101158] ? blk_iolatency_init+0x18d/0x2f0 [ 2899.105675] blkcg_init_queue+0x277/0x3d0 [ 2899.109842] blk_alloc_queue_node+0x64f/0x920 [ 2899.114348] ? kasan_kmalloc+0x9/0x10 [ 2899.118169] ? blk_set_queue_dying+0x70/0x70 [ 2899.122612] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2899.127815] ? __fget+0x472/0x710 [ 2899.131288] blk_mq_init_queue+0x4a/0xb0 [ 2899.135373] loop_add+0x35e/0xa30 [ 2899.138834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2899.144385] ? loop_queue_rq+0x730/0x730 [ 2899.148458] ? rcu_read_unlock_special+0x380/0x380 [ 2899.153429] loop_control_ioctl+0x286/0x470 [ 2899.157759] ? loop_add+0xa30/0xa30 [ 2899.161399] ? iterate_fd+0x4b0/0x4b0 [ 2899.165215] ? loop_add+0xa30/0xa30 [ 2899.168860] do_vfs_ioctl+0x107b/0x17d0 [ 2899.172860] ? memset+0x32/0x40 [ 2899.176163] ? ioctl_preallocate+0x2f0/0x2f0 [ 2899.180586] ? smack_inode_setattr+0x290/0x290 [ 2899.185178] ? __fget_light+0x2db/0x420 [ 2899.189173] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2899.194717] ? fput+0x128/0x1a0 [ 2899.198004] ? do_syscall_64+0x8c/0x800 [ 2899.201991] ? do_syscall_64+0x8c/0x800 [ 2899.205979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2899.211533] ? security_file_ioctl+0x93/0xc0 [ 2899.215961] ksys_ioctl+0xab/0xd0 [ 2899.219427] __x64_sys_ioctl+0x73/0xb0 [ 2899.223329] do_syscall_64+0x1a3/0x800 [ 2899.227245] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2899.232191] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2899.237246] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2899.242116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2899.247313] RIP: 0033:0x457ec9 03:41:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x60}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x4000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:33 executing program 4 (fault-call:2 fault-nth:26): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2899.250513] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2899.269463] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2899.277369] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2899.284668] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2899.291953] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2899.299245] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2899.306528] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000000001a0001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2899.448458] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2899.476964] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x6000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x300}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2899.550283] FAULT_INJECTION: forcing a failure. [ 2899.550283] name failslab, interval 1, probability 0, space 0, times 0 [ 2899.561535] CPU: 0 PID: 28457 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2899.568734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2899.578102] Call Trace: [ 2899.580711] dump_stack+0x1db/0x2d0 [ 2899.584363] ? dump_stack_print_info.cold+0x20/0x20 [ 2899.589418] should_fail.cold+0xa/0x15 [ 2899.593335] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2899.598473] ? throtl_pd_offline+0x210/0x210 [ 2899.602905] ? init_timer_on_stack_key+0xe0/0xe0 [ 2899.607678] ? __lock_is_held+0xb6/0x140 [ 2899.612283] __should_failslab+0x121/0x190 [ 2899.616717] should_failslab+0x9/0x14 [ 2899.620535] kmem_cache_alloc_node_trace+0x5a/0x720 [ 2899.625570] ? lock_acquire+0x1db/0x570 [ 2899.629566] throtl_pd_alloc+0x107/0x9c0 [ 2899.633639] ? throtl_add_bio_tg+0x210/0x210 [ 2899.638055] ? trace_hardirqs_on_caller+0x310/0x310 [ 2899.643083] ? throtl_add_bio_tg+0x210/0x210 [ 2899.647508] ? throtl_add_bio_tg+0x210/0x210 [ 2899.651932] blkcg_activate_policy+0x242/0x560 [ 2899.656546] blk_throtl_init+0x3cf/0x640 [ 2899.660618] ? blk_throtl_drain+0x6c0/0x6c0 [ 2899.665019] ? blk_iolatency_init+0x18d/0x2f0 [ 2899.669546] blkcg_init_queue+0x277/0x3d0 [ 2899.673708] blk_alloc_queue_node+0x64f/0x920 [ 2899.678224] ? kasan_kmalloc+0x9/0x10 [ 2899.682038] ? blk_set_queue_dying+0x70/0x70 [ 2899.686480] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2899.691684] ? __fget+0x472/0x710 [ 2899.695153] blk_mq_init_queue+0x4a/0xb0 [ 2899.699237] loop_add+0x35e/0xa30 [ 2899.702695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2899.708246] ? loop_queue_rq+0x730/0x730 [ 2899.712314] ? rcu_read_unlock_special+0x380/0x380 [ 2899.717268] loop_control_ioctl+0x286/0x470 [ 2899.721610] ? loop_add+0xa30/0xa30 [ 2899.725256] ? iterate_fd+0x4b0/0x4b0 [ 2899.729076] ? loop_add+0xa30/0xa30 [ 2899.732711] do_vfs_ioctl+0x107b/0x17d0 [ 2899.736697] ? memset+0x32/0x40 [ 2899.739987] ? ioctl_preallocate+0x2f0/0x2f0 [ 2899.744407] ? smack_inode_setattr+0x290/0x290 [ 2899.748998] ? __fget_light+0x2db/0x420 [ 2899.752990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2899.758535] ? fput+0x128/0x1a0 [ 2899.761828] ? do_syscall_64+0x8c/0x800 [ 2899.765811] ? do_syscall_64+0x8c/0x800 [ 2899.769808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2899.775358] ? security_file_ioctl+0x93/0xc0 [ 2899.779780] ksys_ioctl+0xab/0xd0 [ 2899.783246] __x64_sys_ioctl+0x73/0xb0 [ 2899.787144] do_syscall_64+0x1a3/0x800 [ 2899.791053] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2899.795996] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2899.801034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2899.805899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2899.811098] RIP: 0033:0x457ec9 [ 2899.814296] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2899.833216] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2899.840941] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 03:41:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x2ea) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x7000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2899.848227] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2899.855505] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2899.862782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2899.862792] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000ffffffef001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:34 executing program 4 (fault-call:2 fault-nth:27): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x500}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2899.994561] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2900.025638] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xa000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x0, 0x0, [0xffffffffffff8a78, 0x5, 0x8, 0x1]}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv:\xa3RP\xf4\xe3\xcd\xe1e\xe6\xe1$OOj\xd1\x10', 0x13) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2900.197854] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2900.207299] input: syz1 as /devices/virtual/input/input4850 [ 2900.216240] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2900.248188] FAULT_INJECTION: forcing a failure. [ 2900.248188] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.259425] CPU: 0 PID: 28487 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2900.259435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2900.259441] Call Trace: [ 2900.259466] dump_stack+0x1db/0x2d0 [ 2900.259488] ? dump_stack_print_info.cold+0x20/0x20 [ 2900.259518] should_fail.cold+0xa/0x15 [ 2900.259536] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2900.259558] ? throtl_pd_offline+0x210/0x210 [ 2900.259574] ? init_timer_on_stack_key+0xe0/0xe0 [ 2900.259593] ? __lock_is_held+0xb6/0x140 [ 2900.259618] __should_failslab+0x121/0x190 [ 2900.259637] should_failslab+0x9/0x14 [ 2900.309566] kmem_cache_alloc_node_trace+0x5a/0x720 [ 2900.309587] ? lock_acquire+0x1db/0x570 [ 2900.309610] throtl_pd_alloc+0x107/0x9c0 [ 2900.309630] ? throtl_add_bio_tg+0x210/0x210 [ 2900.330672] ? trace_hardirqs_on_caller+0x310/0x310 [ 2900.330697] ? throtl_add_bio_tg+0x210/0x210 [ 2900.330714] ? throtl_add_bio_tg+0x210/0x210 [ 2900.330735] blkcg_activate_policy+0x242/0x560 [ 2900.330764] blk_throtl_init+0x3cf/0x640 [ 2900.330779] ? blk_throtl_drain+0x6c0/0x6c0 [ 2900.330796] ? blk_iolatency_init+0x18d/0x2f0 [ 2900.330815] blkcg_init_queue+0x277/0x3d0 [ 2900.330833] blk_alloc_queue_node+0x64f/0x920 [ 2900.330848] ? kasan_kmalloc+0x9/0x10 [ 2900.330865] ? blk_set_queue_dying+0x70/0x70 [ 2900.330892] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2900.330911] ? __fget+0x472/0x710 [ 2900.362084] blk_mq_init_queue+0x4a/0xb0 03:41:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d22000018000000030300000000030000007fffffff001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x600}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2900.362106] loop_add+0x35e/0xa30 [ 2900.362132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2900.362154] ? loop_queue_rq+0x730/0x730 [ 2900.362170] ? rcu_read_unlock_special+0x380/0x380 [ 2900.362193] loop_control_ioctl+0x286/0x470 [ 2900.362208] ? loop_add+0xa30/0xa30 [ 2900.362231] ? iterate_fd+0x4b0/0x4b0 [ 2900.362249] ? loop_add+0xa30/0xa30 [ 2900.362263] do_vfs_ioctl+0x107b/0x17d0 [ 2900.362280] ? memset+0x32/0x40 [ 2900.383723] ? ioctl_preallocate+0x2f0/0x2f0 [ 2900.383743] ? smack_inode_setattr+0x290/0x290 [ 2900.383760] ? __fget_light+0x2db/0x420 [ 2900.383786] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2900.383801] ? fput+0x128/0x1a0 [ 2900.383816] ? do_syscall_64+0x8c/0x800 [ 2900.383830] ? do_syscall_64+0x8c/0x800 [ 2900.383846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2900.383862] ? security_file_ioctl+0x93/0xc0 [ 2900.383880] ksys_ioctl+0xab/0xd0 [ 2900.418806] __x64_sys_ioctl+0x73/0xb0 [ 2900.418828] do_syscall_64+0x1a3/0x800 [ 2900.418848] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2900.418867] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2900.441528] ? __switch_to_asm+0x34/0x70 [ 2900.441554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2900.441581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2900.441593] RIP: 0033:0x457ec9 [ 2900.441606] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2900.441613] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:41:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2900.441626] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2900.441635] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2900.441643] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2900.441651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2900.441659] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2900.591277] input: syz1 as /devices/virtual/input/input4851 03:41:35 executing program 4 (fault-call:2 fault-nth:28): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000200)='nv\x00', 0xffffffffffffffff}, 0x30) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xa681c39, 0x9, 0x8001, 0x4, 0x0, 0x1, 0x4002, 0x0, 0x6, 0x80000000, 0x6, 0x3, 0x1, 0xffffffffffffff80, 0x6, 0x3f, 0x6, 0x9, 0x0, 0xc1, 0x5, 0x3, 0x0, 0x23a, 0x4000, 0x30d, 0xff, 0x7, 0x8, 0x9, 0xfff, 0x7fff, 0x100000000, 0xffffffffffff12f8, 0x9, 0x200, 0x0, 0x8001, 0x5, @perf_config_ext={0x2, 0x800}, 0x4000, 0x5, 0x0, 0x0, 0x6, 0x6, 0x10001}, r1, 0x1, r2, 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000efffffff001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2900.663526] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2900.685367] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x18020000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x700}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e24, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2900.868453] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2900.880000] input: syz1 as /devices/virtual/input/input4852 [ 2900.891262] input: syz1 as /devices/virtual/input/input4853 [ 2900.901448] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2900.920690] FAULT_INJECTION: forcing a failure. [ 2900.920690] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.969153] CPU: 1 PID: 28517 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2900.976389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2900.985751] Call Trace: [ 2900.988360] dump_stack+0x1db/0x2d0 [ 2900.992014] ? dump_stack_print_info.cold+0x20/0x20 [ 2900.997047] ? trace_hardirqs_on_caller+0x310/0x310 [ 2901.002092] ? do_raw_spin_trylock+0x270/0x270 [ 2901.006693] should_fail.cold+0xa/0x15 [ 2901.010600] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2901.015718] ? ___might_sleep+0x1e7/0x310 [ 2901.019877] ? arch_local_save_flags+0x50/0x50 [ 2901.024471] ? __kasan_slab_free+0x119/0x150 [ 2901.028890] __should_failslab+0x121/0x190 [ 2901.033135] should_failslab+0x9/0x14 [ 2901.036943] kmem_cache_alloc_trace+0x2d1/0x760 [ 2901.041616] ? blkcg_activate_policy+0x6a/0x560 [ 2901.046298] ? blk_mq_queue_stopped+0x130/0x130 [ 2901.050974] blk_stat_alloc_callback+0x58/0x270 [ 2901.055644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.061185] ? blk_mq_hctx_mark_pending+0x180/0x180 [ 2901.066473] blk_mq_init_allocated_queue+0x103/0x1940 [ 2901.071673] ? blk_iolatency_init+0x18d/0x2f0 [ 2901.076174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.081715] ? blkcg_init_queue+0x18a/0x3d0 [ 2901.086052] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2901.090563] ? blk_alloc_queue_node+0x663/0x920 [ 2901.095240] ? kasan_kmalloc+0x9/0x10 [ 2901.099050] ? blk_set_queue_dying+0x70/0x70 [ 2901.103492] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2901.108702] blk_mq_init_queue+0x62/0xb0 [ 2901.112793] loop_add+0x35e/0xa30 [ 2901.116253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.121926] ? loop_queue_rq+0x730/0x730 [ 2901.125996] ? rcu_read_unlock_special+0x380/0x380 [ 2901.130950] loop_control_ioctl+0x286/0x470 [ 2901.135284] ? loop_add+0xa30/0xa30 [ 2901.138927] ? iterate_fd+0x4b0/0x4b0 [ 2901.142736] ? loop_add+0xa30/0xa30 [ 2901.146372] do_vfs_ioctl+0x107b/0x17d0 [ 2901.150360] ? memset+0x32/0x40 [ 2901.153646] ? ioctl_preallocate+0x2f0/0x2f0 [ 2901.158072] ? smack_inode_setattr+0x290/0x290 [ 2901.162657] ? __fget_light+0x2db/0x420 [ 2901.166651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2901.172191] ? fput+0x128/0x1a0 [ 2901.175475] ? do_syscall_64+0x8c/0x800 [ 2901.179453] ? do_syscall_64+0x8c/0x800 [ 2901.183435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.188981] ? security_file_ioctl+0x93/0xc0 [ 2901.193398] ksys_ioctl+0xab/0xd0 [ 2901.196867] __x64_sys_ioctl+0x73/0xb0 [ 2901.200762] do_syscall_64+0x1a3/0x800 [ 2901.204657] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2901.209692] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2901.214732] ? __switch_to_asm+0x34/0x70 [ 2901.218835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2901.223694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2901.228886] RIP: 0033:0x457ec9 [ 2901.232093] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2901.251088] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2901.258799] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 03:41:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000020000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x20000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2901.266100] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2901.273373] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2901.280645] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2901.287920] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:35 executing program 4 (fault-call:2 fault-nth:29): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x18) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) fcntl$setsig(r0, 0xa, 0x9) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000400)={{0x4, @rand_addr=0x6, 0x4e23, 0x4, 'nq\x00', 0x24, 0x6, 0x68}, {@broadcast, 0x4e20, 0x0, 0x832d, 0x401, 0x1000}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000200)={0x71, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) fcntl$getown(r0, 0x9) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000480)={0x8000, 0x400, 0x80, 0x4, 0x81, 0xc3}) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x400, 0x0) accept$inet(r1, &(0x7f0000000500)={0x2, 0x0, @remote}, &(0x7f0000000540)=0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000004c0)={0x0, 0x6, 0x80, 0x3ff}) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3c000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2901.440086] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2901.457127] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2901.508118] FAULT_INJECTION: forcing a failure. [ 2901.508118] name failslab, interval 1, probability 0, space 0, times 0 [ 2901.528248] CPU: 0 PID: 28533 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2901.535487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2901.544838] Call Trace: [ 2901.544864] dump_stack+0x1db/0x2d0 [ 2901.544885] ? dump_stack_print_info.cold+0x20/0x20 [ 2901.544903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.544918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.544945] should_fail.cold+0xa/0x15 [ 2901.551151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2901.551181] ? ___might_sleep+0x1e7/0x310 [ 2901.551199] ? arch_local_save_flags+0x50/0x50 [ 2901.551230] __should_failslab+0x121/0x190 [ 2901.551250] should_failslab+0x9/0x14 [ 2901.593048] kmem_cache_alloc_trace+0x2d1/0x760 [ 2901.597724] ? blk_mq_queue_stopped+0x130/0x130 [ 2901.602403] ? blk_stat_alloc_callback+0x1b0/0x270 [ 2901.607343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.612904] blk_mq_init_allocated_queue+0x16f/0x1940 [ 2901.618128] ? blk_iolatency_init+0x18d/0x2f0 [ 2901.622635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.628189] ? blkcg_init_queue+0x18a/0x3d0 [ 2901.632530] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2901.637045] ? blk_alloc_queue_node+0x663/0x920 [ 2901.641723] ? kasan_kmalloc+0x9/0x10 [ 2901.645542] ? blk_set_queue_dying+0x70/0x70 [ 2901.649975] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2901.655184] ? __fget+0x472/0x710 [ 2901.658658] blk_mq_init_queue+0x62/0xb0 [ 2901.662738] loop_add+0x35e/0xa30 [ 2901.666208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.671760] ? loop_queue_rq+0x730/0x730 [ 2901.675832] ? rcu_read_unlock_special+0x380/0x380 [ 2901.680780] loop_control_ioctl+0x286/0x470 [ 2901.685115] ? loop_add+0xa30/0xa30 [ 2901.688764] ? iterate_fd+0x4b0/0x4b0 [ 2901.692584] ? loop_add+0xa30/0xa30 [ 2901.696219] do_vfs_ioctl+0x107b/0x17d0 [ 2901.700244] ? memset+0x32/0x40 [ 2901.703542] ? ioctl_preallocate+0x2f0/0x2f0 [ 2901.707963] ? smack_inode_setattr+0x290/0x290 [ 2901.712555] ? __fget_light+0x2db/0x420 [ 2901.716548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2901.722097] ? fput+0x128/0x1a0 [ 2901.725390] ? do_syscall_64+0x8c/0x800 [ 2901.729375] ? do_syscall_64+0x8c/0x800 [ 2901.733363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2901.738915] ? security_file_ioctl+0x93/0xc0 [ 2901.743336] ksys_ioctl+0xab/0xd0 [ 2901.746811] __x64_sys_ioctl+0x73/0xb0 [ 2901.750717] do_syscall_64+0x1a3/0x800 03:41:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x6000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000040000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000200)="383d740ef80309c0b89cfb69354338077519eee77740b23bb0dfd57e9e9f23ea1316f89f2700e7a5cff6ca052718f149ef089bf192675b7e1276590b2141051556f70f7a7a1b3931bf3b552f8ab5c39329d0a54a2cc3bd9a785cb15390ff5ef21ccc310eeb5b5746088f3731b7c27091a26c779efc51172a6b42e4fcce0fb4ab615e23de425fa9a5739ce7965008a92afc8fe2e006f411f900e64132e54d17559d6fc9345cda8b20197827be4b0e9fb9fb4672f7baeab6b7780a0ffa7e1b81fc6b9cdfc3f142f173b42697", 0xcb, 0x0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @multicast2}, 0x1, 0x0, 0x4, 0x1}}, 0x80) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2901.754615] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2901.759558] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2901.764590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2901.769462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2901.774660] RIP: 0033:0x457ec9 [ 2901.777867] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2901.796772] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2901.796787] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2901.796797] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2901.796806] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2901.796815] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2901.796824] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3f000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:36 executing program 4 (fault-call:2 fault-nth:30): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2901.898119] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2901.912134] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000050000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0xff00}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_TIMERSLACK(0x1d, 0x3e) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2902.024369] FAULT_INJECTION: forcing a failure. [ 2902.024369] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.049604] input: syz1 as /devices/virtual/input/input4855 [ 2902.062795] CPU: 1 PID: 28555 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2902.070019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2902.070028] Call Trace: [ 2902.070052] dump_stack+0x1db/0x2d0 [ 2902.070074] ? dump_stack_print_info.cold+0x20/0x20 [ 2902.090660] should_fail.cold+0xa/0x15 [ 2902.094567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2902.099686] ? ___might_sleep+0x1e7/0x310 [ 2902.103851] ? arch_local_save_flags+0x50/0x50 [ 2902.108464] __should_failslab+0x121/0x190 [ 2902.112713] should_failslab+0x9/0x14 [ 2902.116525] kmem_cache_alloc_node_trace+0x270/0x720 [ 2902.122407] ? find_next_bit+0x107/0x130 [ 2902.126495] __kmalloc_node+0x3d/0x70 [ 2902.130313] blk_mq_init_allocated_queue+0x490/0x1940 [ 2902.135597] ? blk_iolatency_init+0x18d/0x2f0 [ 2902.140110] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2902.144613] ? blk_alloc_queue_node+0x663/0x920 [ 2902.149292] ? kasan_kmalloc+0x9/0x10 [ 2902.153108] ? blk_set_queue_dying+0x70/0x70 [ 2902.157628] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2902.162828] ? __fget+0x472/0x710 [ 2902.166299] blk_mq_init_queue+0x62/0xb0 [ 2902.170375] loop_add+0x35e/0xa30 [ 2902.173857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2902.179409] ? loop_queue_rq+0x730/0x730 [ 2902.183482] ? rcu_read_unlock_special+0x380/0x380 [ 2902.188433] loop_control_ioctl+0x286/0x470 [ 2902.192766] ? loop_add+0xa30/0xa30 [ 2902.196405] ? iterate_fd+0x4b0/0x4b0 [ 2902.200216] ? loop_add+0xa30/0xa30 [ 2902.203866] do_vfs_ioctl+0x107b/0x17d0 [ 2902.207851] ? memset+0x32/0x40 [ 2902.211141] ? ioctl_preallocate+0x2f0/0x2f0 [ 2902.215554] ? smack_inode_setattr+0x290/0x290 [ 2902.220142] ? __fget_light+0x2db/0x420 [ 2902.224221] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2902.229766] ? fput+0x128/0x1a0 [ 2902.233054] ? do_syscall_64+0x8c/0x800 [ 2902.237035] ? do_syscall_64+0x8c/0x800 [ 2902.241015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2902.246559] ? security_file_ioctl+0x93/0xc0 [ 2902.250985] ksys_ioctl+0xab/0xd0 [ 2902.254453] __x64_sys_ioctl+0x73/0xb0 [ 2902.258359] do_syscall_64+0x1a3/0x800 [ 2902.262255] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2902.267196] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2902.272226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2902.277099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2902.282288] RIP: 0033:0x457ec9 [ 2902.285487] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2902.304393] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2902.312199] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 03:41:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x40020000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2902.319471] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2902.326754] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2902.334027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2902.341390] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2902.359566] input: syz0 as /devices/virtual/input/input4856 03:41:37 executing program 4 (fault-call:2 fault-nth:31): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000080000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x200, 0x2040) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0x200, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}}, 0x2c}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000010) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000035000000484e6bcc766c424f0ee6bba0c9835b4faeae7c240071b6da89aa7f8448958ca9ba9e30d8ec863f3c6b329d08579504a14d29c3c35186833220ac6b8ef99dfa83ab0025f186bb865d5a30aa9817db263a9b1eb5f9756c53e13496cc7b2cbfcbf91767c038eabb7a3e8f178c"], &(0x7f0000000200)=0x59) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2902.475910] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x55e410ac, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2902.528819] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2902.574719] input: syz1 as /devices/virtual/input/input4857 [ 2902.597065] FAULT_INJECTION: forcing a failure. [ 2902.597065] name failslab, interval 1, probability 0, space 0, times 0 [ 2902.617180] input: syz0 as /devices/virtual/input/input4858 [ 2902.634271] CPU: 0 PID: 28574 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2902.641510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2902.650880] Call Trace: [ 2902.653490] dump_stack+0x1db/0x2d0 [ 2902.657145] ? dump_stack_print_info.cold+0x20/0x20 [ 2902.662297] should_fail.cold+0xa/0x15 [ 2902.666222] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2902.671359] ? ___might_sleep+0x1e7/0x310 [ 2902.675520] ? arch_local_save_flags+0x50/0x50 [ 2902.680130] __should_failslab+0x121/0x190 [ 2902.684488] should_failslab+0x9/0x14 [ 2902.688311] kmem_cache_alloc_node_trace+0x270/0x720 [ 2902.693429] ? find_next_bit+0x107/0x130 [ 2902.697565] __kmalloc_node+0x3d/0x70 [ 2902.701383] blk_mq_init_allocated_queue+0x490/0x1940 [ 2902.706607] ? blk_iolatency_init+0x18d/0x2f0 [ 2902.711101] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2902.715604] ? blk_alloc_queue_node+0x663/0x920 [ 2902.720292] ? kasan_kmalloc+0x9/0x10 [ 2902.724110] ? blk_set_queue_dying+0x70/0x70 [ 2902.728540] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2902.733740] ? __fget+0x472/0x710 [ 2902.737215] blk_mq_init_queue+0x62/0xb0 [ 2902.741295] loop_add+0x35e/0xa30 [ 2902.744758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2902.750333] ? loop_queue_rq+0x730/0x730 [ 2902.754435] ? rcu_read_unlock_special+0x380/0x380 [ 2902.759391] loop_control_ioctl+0x286/0x470 [ 2902.763720] ? loop_add+0xa30/0xa30 [ 2902.767364] ? iterate_fd+0x4b0/0x4b0 [ 2902.771187] ? loop_add+0xa30/0xa30 [ 2902.774817] do_vfs_ioctl+0x107b/0x17d0 [ 2902.774839] ? memset+0x32/0x40 [ 2902.774856] ? ioctl_preallocate+0x2f0/0x2f0 [ 2902.774871] ? smack_inode_setattr+0x290/0x290 [ 2902.774888] ? __fget_light+0x2db/0x420 [ 2902.782160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2902.800589] ? fput+0x128/0x1a0 [ 2902.800606] ? do_syscall_64+0x8c/0x800 [ 2902.807841] ? do_syscall_64+0x8c/0x800 [ 2902.811940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2902.811960] ? security_file_ioctl+0x93/0xc0 [ 2902.811979] ksys_ioctl+0xab/0xd0 [ 2902.811997] __x64_sys_ioctl+0x73/0xb0 [ 2902.829367] do_syscall_64+0x1a3/0x800 03:41:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2902.829389] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2902.829406] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2902.843222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2902.843250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2902.843263] RIP: 0033:0x457ec9 [ 2902.843276] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2902.843285] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:41:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@v1={0x2, "5d0e049a80a5f1aa61ab63"}, 0xc, 0x1) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x91ffffff, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2902.856497] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2902.856507] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2902.856516] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2902.856526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2902.856535] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:37 executing program 4 (fault-call:2 fault-nth:32): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000100000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2902.993930] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x8) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='\xd6', 0x5) sendto$inet(r0, 0x0, 0x0, 0x50, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000140)="6dcb0000000000004cbf4649", 0xc, 0x0, 0x0, 0x0) 03:41:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2903.064513] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xa0008000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2903.141792] FAULT_INJECTION: forcing a failure. [ 2903.141792] name failslab, interval 1, probability 0, space 0, times 0 [ 2903.169590] CPU: 1 PID: 28591 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2903.176843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2903.186212] Call Trace: [ 2903.188818] dump_stack+0x1db/0x2d0 [ 2903.192455] ? dump_stack_print_info.cold+0x20/0x20 [ 2903.197589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.203131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.208776] should_fail.cold+0xa/0x15 [ 2903.212678] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2903.217795] ? ___might_sleep+0x1e7/0x310 [ 2903.221955] ? arch_local_save_flags+0x50/0x50 [ 2903.226555] __should_failslab+0x121/0x190 [ 2903.230802] should_failslab+0x9/0x14 [ 2903.234610] kmem_cache_alloc_trace+0x2d1/0x760 [ 2903.239286] ? blk_mq_queue_stopped+0x130/0x130 [ 2903.243967] ? blk_stat_alloc_callback+0x1b0/0x270 [ 2903.248920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.254561] blk_mq_init_allocated_queue+0x16f/0x1940 [ 2903.259762] ? blk_iolatency_init+0x18d/0x2f0 [ 2903.264266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.269811] ? blkcg_init_queue+0x18a/0x3d0 [ 2903.274147] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2903.278650] ? blk_alloc_queue_node+0x663/0x920 [ 2903.283331] ? kasan_kmalloc+0x9/0x10 [ 2903.287144] ? blk_set_queue_dying+0x70/0x70 [ 2903.291751] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2903.296947] ? __fget+0x472/0x710 [ 2903.300410] blk_mq_init_queue+0x62/0xb0 [ 2903.304481] loop_add+0x35e/0xa30 [ 2903.307939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.313486] ? loop_queue_rq+0x730/0x730 [ 2903.317551] ? rcu_read_unlock_special+0x380/0x380 [ 2903.322544] loop_control_ioctl+0x286/0x470 [ 2903.326890] ? loop_add+0xa30/0xa30 [ 2903.330526] ? iterate_fd+0x4b0/0x4b0 [ 2903.334437] ? loop_add+0xa30/0xa30 [ 2903.338072] do_vfs_ioctl+0x107b/0x17d0 [ 2903.342055] ? memset+0x32/0x40 [ 2903.345344] ? ioctl_preallocate+0x2f0/0x2f0 [ 2903.349780] ? smack_inode_setattr+0x290/0x290 [ 2903.354542] ? __fget_light+0x2db/0x420 [ 2903.358530] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2903.364081] ? fput+0x128/0x1a0 [ 2903.367456] ? do_syscall_64+0x8c/0x800 [ 2903.371433] ? do_syscall_64+0x8c/0x800 [ 2903.375421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.380963] ? security_file_ioctl+0x93/0xc0 [ 2903.385380] ksys_ioctl+0xab/0xd0 [ 2903.388841] __x64_sys_ioctl+0x73/0xb0 [ 2903.392740] do_syscall_64+0x1a3/0x800 [ 2903.396642] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2903.401595] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2903.406637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2903.411511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2903.416706] RIP: 0033:0x457ec9 [ 2903.419905] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2903.438895] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2903.446610] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2903.453887] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2903.461185] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2903.468472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2903.475746] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:38 executing program 4 (fault-call:2 fault-nth:33): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2903.571854] input: syz1 as /devices/virtual/input/input4859 [ 2903.586046] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2903.604371] input: syz1 as /devices/virtual/input/input4860 03:41:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xa0010000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2903.619791] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000a00100001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @remote}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='venk\x88', 0x1) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) socket$inet(0x2, 0xa, 0x7ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x606000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) [ 2903.734583] FAULT_INJECTION: forcing a failure. [ 2903.734583] name failslab, interval 1, probability 0, space 0, times 0 [ 2903.754392] CPU: 1 PID: 28611 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2903.761633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2903.770997] Call Trace: [ 2903.773603] dump_stack+0x1db/0x2d0 [ 2903.777249] ? dump_stack_print_info.cold+0x20/0x20 [ 2903.782301] should_fail.cold+0xa/0x15 [ 2903.786205] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2903.791329] ? ___might_sleep+0x1e7/0x310 [ 2903.795489] ? arch_local_save_flags+0x50/0x50 [ 2903.800078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.805624] ? check_preemption_disabled+0x48/0x290 [ 2903.810655] __should_failslab+0x121/0x190 [ 2903.814904] should_failslab+0x9/0x14 [ 2903.818710] kmem_cache_alloc_node_trace+0x270/0x720 [ 2903.823812] ? __kmalloc_node+0x3d/0x70 [ 2903.827813] __kmalloc_node+0x3d/0x70 [ 2903.831635] sbitmap_init_node+0x29e/0x510 [ 2903.835889] blk_mq_realloc_hw_ctxs+0x651/0x1200 [ 2903.840668] ? blk_mq_free_map_and_requests+0x160/0x160 [ 2903.846050] ? kasan_unpoison_shadow+0x35/0x50 [ 2903.850747] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2903.855864] ? kasan_kmalloc+0x9/0x10 [ 2903.859681] blk_mq_init_allocated_queue+0x4d4/0x1940 [ 2903.864881] ? blk_iolatency_init+0x18d/0x2f0 [ 2903.869392] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2903.873890] ? blk_alloc_queue_node+0x663/0x920 [ 2903.878572] ? kasan_kmalloc+0x9/0x10 [ 2903.882388] ? blk_set_queue_dying+0x70/0x70 [ 2903.886825] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2903.892021] ? __fget+0x472/0x710 [ 2903.895495] blk_mq_init_queue+0x62/0xb0 [ 2903.899567] loop_add+0x35e/0xa30 [ 2903.903030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.908585] ? loop_queue_rq+0x730/0x730 [ 2903.912659] ? rcu_read_unlock_special+0x380/0x380 [ 2903.917621] loop_control_ioctl+0x286/0x470 [ 2903.921950] ? loop_add+0xa30/0xa30 [ 2903.925602] ? iterate_fd+0x4b0/0x4b0 [ 2903.929416] ? loop_add+0xa30/0xa30 [ 2903.933052] do_vfs_ioctl+0x107b/0x17d0 [ 2903.937040] ? memset+0x32/0x40 [ 2903.940331] ? ioctl_preallocate+0x2f0/0x2f0 [ 2903.944745] ? smack_inode_setattr+0x290/0x290 [ 2903.949335] ? __fget_light+0x2db/0x420 [ 2903.953327] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2903.958869] ? fput+0x128/0x1a0 [ 2903.962155] ? do_syscall_64+0x8c/0x800 [ 2903.966134] ? do_syscall_64+0x8c/0x800 [ 2903.970119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2903.975686] ? security_file_ioctl+0x93/0xc0 [ 2903.980102] ksys_ioctl+0xab/0xd0 [ 2903.983566] __x64_sys_ioctl+0x73/0xb0 [ 2903.987464] do_syscall_64+0x1a3/0x800 [ 2903.991474] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2903.996480] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2904.001513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2904.006372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2904.011564] RIP: 0033:0x457ec9 [ 2904.014768] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2904.033678] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2904.041390] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2904.048660] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2904.055936] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2904.063209] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2904.070483] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:38 executing program 4 (fault-call:2 fault-nth:34): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xac10e455, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2904.186194] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2904.234474] input: syz1 as /devices/virtual/input/input4861 [ 2904.246593] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2904.258683] input: syz1 as /devices/virtual/input/input4862 [ 2904.269420] FAULT_INJECTION: forcing a failure. [ 2904.269420] name failslab, interval 1, probability 0, space 0, times 0 [ 2904.293413] CPU: 1 PID: 28628 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2904.300725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2904.310078] Call Trace: [ 2904.312677] dump_stack+0x1db/0x2d0 [ 2904.316322] ? dump_stack_print_info.cold+0x20/0x20 [ 2904.321371] should_fail.cold+0xa/0x15 [ 2904.325272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2904.330391] ? ___might_sleep+0x1e7/0x310 [ 2904.334549] ? arch_local_save_flags+0x50/0x50 [ 2904.339148] __should_failslab+0x121/0x190 [ 2904.343392] should_failslab+0x9/0x14 [ 2904.347200] kmem_cache_alloc_node_trace+0x270/0x720 [ 2904.352309] ? rcu_read_lock_sched_held+0x110/0x130 [ 2904.357336] blk_alloc_flush_queue+0x114/0x410 [ 2904.361928] ? blk_insert_flush+0x730/0x730 [ 2904.366256] ? __raw_spin_lock_init+0x2d/0x100 [ 2904.370846] ? lockdep_init_map+0x10c/0x5b0 [ 2904.375183] blk_mq_realloc_hw_ctxs+0x86e/0x1200 [ 2904.379967] ? blk_mq_free_map_and_requests+0x160/0x160 [ 2904.385344] ? kasan_unpoison_shadow+0x35/0x50 [ 2904.389929] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2904.395037] ? kasan_kmalloc+0x9/0x10 [ 2904.398845] blk_mq_init_allocated_queue+0x4d4/0x1940 [ 2904.404043] ? blk_iolatency_init+0x18d/0x2f0 [ 2904.408555] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2904.413052] ? blk_alloc_queue_node+0x663/0x920 [ 2904.417719] ? kasan_kmalloc+0x9/0x10 [ 2904.421528] ? blk_set_queue_dying+0x70/0x70 [ 2904.425965] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2904.431161] ? __fget+0x472/0x710 [ 2904.434621] blk_mq_init_queue+0x62/0xb0 [ 2904.438686] loop_add+0x35e/0xa30 [ 2904.442144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2904.447703] ? loop_queue_rq+0x730/0x730 [ 2904.451773] ? rcu_read_unlock_special+0x380/0x380 [ 2904.456717] loop_control_ioctl+0x286/0x470 [ 2904.461158] ? loop_add+0xa30/0xa30 [ 2904.464802] ? iterate_fd+0x4b0/0x4b0 [ 2904.468612] ? loop_add+0xa30/0xa30 [ 2904.472244] do_vfs_ioctl+0x107b/0x17d0 [ 2904.476223] ? memset+0x32/0x40 [ 2904.479506] ? ioctl_preallocate+0x2f0/0x2f0 [ 2904.483921] ? smack_inode_setattr+0x290/0x290 [ 2904.488519] ? __fget_light+0x2db/0x420 [ 2904.492516] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2904.498058] ? fput+0x128/0x1a0 [ 2904.501342] ? do_syscall_64+0x8c/0x800 [ 2904.505323] ? do_syscall_64+0x8c/0x800 [ 2904.509319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2904.514879] ? security_file_ioctl+0x93/0xc0 [ 2904.519301] ksys_ioctl+0xab/0xd0 [ 2904.522783] __x64_sys_ioctl+0x73/0xb0 [ 2904.526695] do_syscall_64+0x1a3/0x800 [ 2904.530590] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2904.535617] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2904.540641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2904.545597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2904.550793] RIP: 0033:0x457ec9 [ 2904.553987] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2904.572884] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2904.580682] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 03:41:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2904.587953] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2904.595221] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2904.602495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2904.609771] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:39 executing program 4 (fault-call:2 fault-nth:35): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000500001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000140)='team_slave_1\x00'}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0xffffffffffffff0a, 0x0, 0x0, 0x30a) 03:41:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xcd4e0000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2904.742897] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2904.783603] FAULT_INJECTION: forcing a failure. [ 2904.783603] name failslab, interval 1, probability 0, space 0, times 0 [ 2904.805468] CPU: 1 PID: 28635 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2904.812719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2904.822085] Call Trace: [ 2904.824687] dump_stack+0x1db/0x2d0 [ 2904.828345] ? dump_stack_print_info.cold+0x20/0x20 [ 2904.833405] should_fail.cold+0xa/0x15 [ 2904.837327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2904.842450] ? ___might_sleep+0x1e7/0x310 [ 2904.846606] ? arch_local_save_flags+0x50/0x50 [ 2904.851214] __should_failslab+0x121/0x190 [ 2904.853840] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2904.855545] should_failslab+0x9/0x14 [ 2904.855560] kmem_cache_alloc_node_trace+0x270/0x720 [ 2904.855579] ? rcu_read_lock_sched_held+0x110/0x130 [ 2904.877627] blk_alloc_flush_queue+0x114/0x410 [ 2904.882223] ? blk_insert_flush+0x730/0x730 [ 2904.886555] ? __raw_spin_lock_init+0x2d/0x100 [ 2904.891218] ? lockdep_init_map+0x10c/0x5b0 [ 2904.895568] blk_mq_realloc_hw_ctxs+0x86e/0x1200 [ 2904.900350] ? blk_mq_free_map_and_requests+0x160/0x160 [ 2904.905742] ? kasan_unpoison_shadow+0x35/0x50 [ 2904.910336] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2904.915454] ? kasan_kmalloc+0x9/0x10 [ 2904.919271] blk_mq_init_allocated_queue+0x4d4/0x1940 [ 2904.924473] ? blk_iolatency_init+0x18d/0x2f0 [ 2904.929005] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2904.933508] ? blk_alloc_queue_node+0x663/0x920 [ 2904.938179] ? kasan_kmalloc+0x9/0x10 [ 2904.941992] ? blk_set_queue_dying+0x70/0x70 [ 2904.946421] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2904.952130] ? __fget+0x472/0x710 [ 2904.955598] blk_mq_init_queue+0x62/0xb0 [ 2904.959673] loop_add+0x35e/0xa30 [ 2904.963136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2904.968690] ? loop_queue_rq+0x730/0x730 [ 2904.972883] ? rcu_read_unlock_special+0x380/0x380 [ 2904.977945] loop_control_ioctl+0x286/0x470 [ 2904.982286] ? loop_add+0xa30/0xa30 [ 2904.985933] ? iterate_fd+0x4b0/0x4b0 [ 2904.989751] ? loop_add+0xa30/0xa30 [ 2904.993388] do_vfs_ioctl+0x107b/0x17d0 [ 2904.997378] ? memset+0x32/0x40 [ 2905.000671] ? ioctl_preallocate+0x2f0/0x2f0 [ 2905.005099] ? smack_inode_setattr+0x290/0x290 [ 2905.009692] ? __fget_light+0x2db/0x420 [ 2905.013692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2905.019244] ? fput+0x128/0x1a0 [ 2905.022537] ? do_syscall_64+0x8c/0x800 [ 2905.026527] ? do_syscall_64+0x8c/0x800 [ 2905.030520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2905.036077] ? security_file_ioctl+0x93/0xc0 [ 2905.040506] ksys_ioctl+0xab/0xd0 [ 2905.043987] __x64_sys_ioctl+0x73/0xb0 [ 2905.047894] do_syscall_64+0x1a3/0x800 [ 2905.051795] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2905.056745] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2905.061779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2905.066635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2905.071828] RIP: 0033:0x457ec9 [ 2905.075033] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2905.094115] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2905.101838] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2905.109114] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2905.116390] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2905.124143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2905.131421] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000400900001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:39 executing program 4 (fault-call:2 fault-nth:36): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2905.246737] input: syz1 as /devices/virtual/input/input4863 [ 2905.303678] input: syz1 as /devices/virtual/input/input4864 03:41:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe0ffffff, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2905.348357] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x541000, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000200)={0xfffffff, 0x5, 0x8001, [], &(0x7f0000000180)={0xbb0bfe, 0x7, [], @value=0x9}}) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2905.391672] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x6000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000002000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe8030000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000000140), 0x0, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2905.569685] FAULT_INJECTION: forcing a failure. [ 2905.569685] name failslab, interval 1, probability 0, space 0, times 0 [ 2905.618427] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2905.621816] CPU: 1 PID: 28664 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2905.633792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2905.636097] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2905.643143] Call Trace: [ 2905.643190] dump_stack+0x1db/0x2d0 [ 2905.643212] ? dump_stack_print_info.cold+0x20/0x20 [ 2905.643240] should_fail.cold+0xa/0x15 03:41:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x7000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2905.643260] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2905.671575] ? ___might_sleep+0x1e7/0x310 [ 2905.675737] ? arch_local_save_flags+0x50/0x50 [ 2905.680331] ? add_lock_to_list.isra.0+0x450/0x450 [ 2905.685262] ? mutex_trylock+0x2d0/0x2d0 [ 2905.689337] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2905.694456] __should_failslab+0x121/0x190 [ 2905.698704] should_failslab+0x9/0x14 [ 2905.703643] kmem_cache_alloc_node_trace+0x270/0x720 [ 2905.708783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2905.714345] ? find_next_bit+0x107/0x130 [ 2905.718508] blk_mq_init_tags+0x73/0x2c0 [ 2905.722587] blk_mq_alloc_rq_map+0x88/0x200 [ 2905.726920] ? do_raw_spin_trylock+0x270/0x270 [ 2905.731514] blk_mq_init_sched+0x20c/0x750 [ 2905.735768] elevator_init_mq+0xcd/0x160 [ 2905.739843] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2905.745154] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2905.749663] ? blk_alloc_queue_node+0x663/0x920 [ 2905.754344] ? blk_set_queue_dying+0x70/0x70 [ 2905.758770] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2905.763965] ? __fget+0x472/0x710 [ 2905.767436] blk_mq_init_queue+0x62/0xb0 [ 2905.771509] loop_add+0x35e/0xa30 [ 2905.774971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2905.780532] ? loop_queue_rq+0x730/0x730 [ 2905.784613] ? rcu_read_unlock_special+0x380/0x380 [ 2905.789575] loop_control_ioctl+0x286/0x470 [ 2905.793909] ? loop_add+0xa30/0xa30 [ 2905.797551] ? iterate_fd+0x4b0/0x4b0 [ 2905.801362] ? loop_add+0xa30/0xa30 [ 2905.804994] do_vfs_ioctl+0x107b/0x17d0 [ 2905.808978] ? memset+0x32/0x40 [ 2905.812270] ? ioctl_preallocate+0x2f0/0x2f0 [ 2905.816692] ? smack_inode_setattr+0x290/0x290 [ 2905.821280] ? __fget_light+0x2db/0x420 [ 2905.825270] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2905.830818] ? fput+0x128/0x1a0 [ 2905.834106] ? do_syscall_64+0x8c/0x800 [ 2905.838093] ? do_syscall_64+0x8c/0x800 [ 2905.842076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2905.847622] ? security_file_ioctl+0x93/0xc0 [ 2905.852054] ksys_ioctl+0xab/0xd0 [ 2905.855615] __x64_sys_ioctl+0x73/0xb0 [ 2905.859522] do_syscall_64+0x1a3/0x800 [ 2905.863426] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2905.868360] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2905.873387] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2905.878345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2905.883541] RIP: 0033:0x457ec9 [ 2905.886754] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2905.905674] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2905.913389] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2905.920691] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2905.927964] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2905.935244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2905.942524] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xf4010000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:40 executing program 4 (fault-call:2 fault-nth:37): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000003f00001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e1c, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000400)=0x7e47) sysinfo(&(0x7f0000000300)=""/209) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x1, 0x0) creat(&(0x7f0000000500)='./file0\x00', 0x20) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) accept$unix(r1, &(0x7f0000000440)=@abs, &(0x7f00000004c0)=0x6e) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0xffffffffffffffaf) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='netdevsim0\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000140)='security.SMACK64\x00', &(0x7f0000000180)='&posix_acl_accessem1lo-]mime_type\xb7em1', 0x25, 0x1) [ 2906.155149] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2906.165431] input: syz1 as /devices/virtual/input/input4865 [ 2906.186636] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2906.217312] input: syz1 as /devices/virtual/input/input4866 03:41:40 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x7fffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xfeffffff, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2906.358932] FAULT_INJECTION: forcing a failure. [ 2906.358932] name failslab, interval 1, probability 0, space 0, times 0 [ 2906.412448] CPU: 0 PID: 28687 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2906.419687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2906.429136] Call Trace: [ 2906.431746] dump_stack+0x1db/0x2d0 [ 2906.435394] ? dump_stack_print_info.cold+0x20/0x20 [ 2906.440445] should_fail.cold+0xa/0x15 [ 2906.444359] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2906.449484] ? ___might_sleep+0x1e7/0x310 [ 2906.453646] ? arch_local_save_flags+0x50/0x50 03:41:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000240)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x600200, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000180)={r0}) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2906.458241] ? add_lock_to_list.isra.0+0x450/0x450 [ 2906.463183] ? mutex_trylock+0x2d0/0x2d0 [ 2906.467290] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2906.472410] __should_failslab+0x121/0x190 [ 2906.476661] should_failslab+0x9/0x14 [ 2906.480563] kmem_cache_alloc_node_trace+0x270/0x720 [ 2906.485683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2906.491230] ? find_next_bit+0x107/0x130 [ 2906.495314] blk_mq_init_tags+0x73/0x2c0 [ 2906.499391] blk_mq_alloc_rq_map+0x88/0x200 [ 2906.503720] ? do_raw_spin_trylock+0x270/0x270 [ 2906.508424] blk_mq_init_sched+0x20c/0x750 [ 2906.512677] elevator_init_mq+0xcd/0x160 [ 2906.516813] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2906.522127] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2906.526649] ? blk_alloc_queue_node+0x663/0x920 [ 2906.531332] ? blk_set_queue_dying+0x70/0x70 [ 2906.535769] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2906.540970] ? __fget+0x472/0x710 [ 2906.544448] blk_mq_init_queue+0x62/0xb0 [ 2906.548525] loop_add+0x35e/0xa30 [ 2906.551988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2906.557543] ? loop_queue_rq+0x730/0x730 [ 2906.561627] ? rcu_read_unlock_special+0x380/0x380 [ 2906.566606] loop_control_ioctl+0x286/0x470 [ 2906.570947] ? loop_add+0xa30/0xa30 [ 2906.574601] ? iterate_fd+0x4b0/0x4b0 [ 2906.578415] ? loop_add+0xa30/0xa30 [ 2906.582055] do_vfs_ioctl+0x107b/0x17d0 [ 2906.586046] ? memset+0x32/0x40 [ 2906.589342] ? ioctl_preallocate+0x2f0/0x2f0 [ 2906.593764] ? smack_inode_setattr+0x290/0x290 [ 2906.598360] ? __fget_light+0x2db/0x420 [ 2906.602354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2906.607902] ? fput+0x128/0x1a0 [ 2906.611189] ? do_syscall_64+0x8c/0x800 [ 2906.615176] ? do_syscall_64+0x8c/0x800 [ 2906.619164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2906.624721] ? security_file_ioctl+0x93/0xc0 [ 2906.629149] ksys_ioctl+0xab/0xd0 [ 2906.632713] __x64_sys_ioctl+0x73/0xb0 [ 2906.636628] do_syscall_64+0x1a3/0x800 [ 2906.640526] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2906.645473] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2906.650508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2906.655376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2906.660579] RIP: 0033:0x457ec9 [ 2906.663783] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2906.682779] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2906.690609] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2906.697886] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2906.705162] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:41:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xff0f0000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2906.712442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2906.719721] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000094000001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:41 executing program 4 (fault-call:2 fault-nth:38): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x4, 0x8001, 0x8, 0x1, 0xf64, 0x1d20, 0x8001, {0x0, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0xfc}}, 0x4, 0x4, 0x81, 0x5, 0x9}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r1, 0x7, 0x8, 0x7}, &(0x7f0000000340)=0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x410100, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000180)={0x1e4f, 0x0, 0x2023, 0x2, 0xff, {0x1, 0x8}}) [ 2906.804851] input: syz1 as /devices/virtual/input/input4867 [ 2906.822840] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2906.845994] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2906.875239] input: syz0 as /devices/virtual/input/input4868 03:41:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffff91, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2906.958374] FAULT_INJECTION: forcing a failure. [ 2906.958374] name failslab, interval 1, probability 0, space 0, times 0 [ 2906.995190] CPU: 1 PID: 28709 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2907.002514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2907.011885] Call Trace: [ 2907.014494] dump_stack+0x1db/0x2d0 [ 2907.018136] ? dump_stack_print_info.cold+0x20/0x20 [ 2907.023236] ? loop_control_ioctl+0x286/0x470 [ 2907.027748] ? do_vfs_ioctl+0x107b/0x17d0 [ 2907.031910] ? ksys_ioctl+0xab/0xd0 [ 2907.035552] ? __x64_sys_ioctl+0x73/0xb0 [ 2907.039617] ? do_syscall_64+0x1a3/0x800 [ 2907.043698] should_fail.cold+0xa/0x15 [ 2907.047604] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2907.052727] ? ___might_sleep+0x1e7/0x310 [ 2907.056883] ? check_preemption_disabled+0x48/0x290 [ 2907.062018] ? arch_local_save_flags+0x50/0x50 [ 2907.066627] __should_failslab+0x121/0x190 [ 2907.070870] should_failslab+0x9/0x14 [ 2907.074674] kmem_cache_alloc_node_trace+0x270/0x720 [ 2907.079813] ? rcu_read_lock_sched_held+0x110/0x130 [ 2907.084835] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2907.090232] __kmalloc_node+0x3d/0x70 [ 2907.094045] blk_alloc_flush_queue+0x189/0x410 [ 2907.098639] ? blk_insert_flush+0x730/0x730 [ 2907.102972] ? __raw_spin_lock_init+0x2d/0x100 [ 2907.107568] ? lockdep_init_map+0x10c/0x5b0 [ 2907.111910] blk_mq_realloc_hw_ctxs+0x86e/0x1200 [ 2907.116699] ? blk_mq_free_map_and_requests+0x160/0x160 [ 2907.122590] ? kasan_unpoison_shadow+0x35/0x50 [ 2907.127184] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2907.132303] ? kasan_kmalloc+0x9/0x10 [ 2907.136121] blk_mq_init_allocated_queue+0x4d4/0x1940 [ 2907.141352] ? blk_iolatency_init+0x18d/0x2f0 [ 2907.145864] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2907.150362] ? blk_alloc_queue_node+0x663/0x920 [ 2907.155034] ? kasan_kmalloc+0x9/0x10 [ 2907.158841] ? blk_set_queue_dying+0x70/0x70 [ 2907.163270] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2907.168468] ? __fget+0x472/0x710 [ 2907.171933] blk_mq_init_queue+0x62/0xb0 [ 2907.176004] loop_add+0x35e/0xa30 [ 2907.179464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2907.185016] ? loop_queue_rq+0x730/0x730 [ 2907.189088] ? rcu_read_unlock_special+0x380/0x380 [ 2907.194049] loop_control_ioctl+0x286/0x470 [ 2907.198377] ? loop_add+0xa30/0xa30 [ 2907.202015] ? iterate_fd+0x4b0/0x4b0 [ 2907.205825] ? loop_add+0xa30/0xa30 [ 2907.209458] do_vfs_ioctl+0x107b/0x17d0 [ 2907.213455] ? memset+0x32/0x40 [ 2907.216742] ? ioctl_preallocate+0x2f0/0x2f0 [ 2907.221157] ? smack_inode_setattr+0x290/0x290 [ 2907.225748] ? __fget_light+0x2db/0x420 [ 2907.229739] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2907.235280] ? fput+0x128/0x1a0 [ 2907.238575] ? do_syscall_64+0x8c/0x800 [ 2907.242560] ? do_syscall_64+0x8c/0x800 [ 2907.246557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2907.252104] ? security_file_ioctl+0x93/0xc0 [ 2907.256534] ksys_ioctl+0xab/0xd0 [ 2907.259996] __x64_sys_ioctl+0x73/0xb0 [ 2907.263890] do_syscall_64+0x1a3/0x800 [ 2907.267792] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2907.272818] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2907.277847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2907.282710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2907.287902] RIP: 0033:0x457ec9 [ 2907.291108] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:41:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000180)="6888a7fa3db6fe2eab00f29ee635453dfc09") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000004003001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2907.310100] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2907.317813] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2907.325087] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2907.332357] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2907.339631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2907.346901] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:41 executing program 4 (fault-call:2 fault-nth:39): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2907.436609] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2907.478811] input: syz1 as /devices/virtual/input/input4869 [ 2907.495536] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2907.506485] FAULT_INJECTION: forcing a failure. [ 2907.506485] name failslab, interval 1, probability 0, space 0, times 0 03:41:42 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dsp\x00', 0x40a00, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000600)={{0x1d, @broadcast, 0x4e22, 0x1, 'none\x00', 0x1, 0x7, 0x2f}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0x4e23, 0x2007, 0x2, 0x9, 0x5}}, 0x44) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0xfffffffffffffd5c) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x420}, 0xc, &(0x7f00000004c0)={&(0x7f0000000280)={0x218, r3, 0x600, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd0d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x102000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaa8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x166e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x110, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff946}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x779}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5805}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3de}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1c00000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xef}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6a8e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x810}, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r1, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) ftruncate(r1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000540)={'ah\x00'}, &(0x7f0000000580)=0x1e) [ 2907.540696] CPU: 0 PID: 28726 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2907.547942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2907.557308] Call Trace: [ 2907.559912] dump_stack+0x1db/0x2d0 [ 2907.563564] ? dump_stack_print_info.cold+0x20/0x20 [ 2907.568602] ? __lock_is_held+0xb6/0x140 [ 2907.572698] should_fail.cold+0xa/0x15 [ 2907.576610] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2907.581741] ? ___might_sleep+0x1e7/0x310 [ 2907.585914] ? arch_local_save_flags+0x50/0x50 03:41:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x60000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffe0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2907.590538] __should_failslab+0x121/0x190 [ 2907.594795] should_failslab+0x9/0x14 [ 2907.598616] kmem_cache_alloc_node_trace+0x270/0x720 [ 2907.603724] ? init_wait_entry+0x1c0/0x1c0 [ 2907.607974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2907.613541] ? sbitmap_init_node+0x149/0x510 [ 2907.617980] sbitmap_queue_init_node+0x3ac/0x8c0 [ 2907.622766] ? sbitmap_init_node+0x510/0x510 [ 2907.627196] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2907.632498] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2907.638049] ? find_next_bit+0x107/0x130 [ 2907.642125] blk_mq_init_tags+0x17b/0x2c0 [ 2907.642146] blk_mq_alloc_rq_map+0x88/0x200 [ 2907.642161] ? do_raw_spin_trylock+0x270/0x270 [ 2907.642181] blk_mq_init_sched+0x20c/0x750 [ 2907.642208] elevator_init_mq+0xcd/0x160 [ 2907.642226] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2907.668817] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2907.673331] ? blk_alloc_queue_node+0x663/0x920 [ 2907.678022] ? blk_set_queue_dying+0x70/0x70 [ 2907.682463] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2907.687691] ? __fget+0x472/0x710 [ 2907.691169] blk_mq_init_queue+0x62/0xb0 [ 2907.695266] loop_add+0x35e/0xa30 [ 2907.698748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2907.704296] ? loop_queue_rq+0x730/0x730 [ 2907.704315] ? rcu_read_unlock_special+0x380/0x380 [ 2907.704342] loop_control_ioctl+0x286/0x470 [ 2907.704358] ? loop_add+0xa30/0xa30 [ 2907.704381] ? iterate_fd+0x4b0/0x4b0 [ 2907.704397] ? loop_add+0xa30/0xa30 [ 2907.704409] do_vfs_ioctl+0x107b/0x17d0 [ 2907.704427] ? memset+0x32/0x40 [ 2907.735995] ? ioctl_preallocate+0x2f0/0x2f0 [ 2907.740428] ? smack_inode_setattr+0x290/0x290 [ 2907.745024] ? __fget_light+0x2db/0x420 [ 2907.749014] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2907.749032] ? fput+0x128/0x1a0 [ 2907.749050] ? do_syscall_64+0x8c/0x800 [ 2907.749064] ? do_syscall_64+0x8c/0x800 [ 2907.749080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2907.749098] ? security_file_ioctl+0x93/0xc0 [ 2907.749117] ksys_ioctl+0xab/0xd0 [ 2907.749135] __x64_sys_ioctl+0x73/0xb0 [ 2907.749152] do_syscall_64+0x1a3/0x800 03:41:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000340001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2907.749170] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2907.749187] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2907.749208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2907.783299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2907.783314] RIP: 0033:0x457ec9 [ 2907.783327] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2907.783335] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2907.783349] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2907.783358] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2907.783367] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2907.783382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2907.783393] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xfffffffe, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x90000, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000200)=0x101, &(0x7f0000000240)=0x4) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x5) 03:41:42 executing program 4 (fault-call:2 fault-nth:40): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2907.944156] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2907.982073] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfeffff07}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000a00080001f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2908.131499] FAULT_INJECTION: forcing a failure. [ 2908.131499] name failslab, interval 1, probability 0, space 0, times 0 [ 2908.160338] CPU: 0 PID: 28743 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2908.167582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2908.176945] Call Trace: [ 2908.179547] dump_stack+0x1db/0x2d0 [ 2908.183195] ? dump_stack_print_info.cold+0x20/0x20 [ 2908.188222] ? __lock_is_held+0xb6/0x140 [ 2908.192306] should_fail.cold+0xa/0x15 [ 2908.196230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2908.201353] ? ___might_sleep+0x1e7/0x310 [ 2908.205512] ? arch_local_save_flags+0x50/0x50 [ 2908.210114] __should_failslab+0x121/0x190 [ 2908.214371] should_failslab+0x9/0x14 [ 2908.218185] kmem_cache_alloc_node_trace+0x270/0x720 [ 2908.223295] ? init_wait_entry+0x1c0/0x1c0 [ 2908.227552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2908.233112] ? sbitmap_init_node+0x149/0x510 [ 2908.237557] sbitmap_queue_init_node+0x3ac/0x8c0 [ 2908.242341] ? sbitmap_init_node+0x510/0x510 [ 2908.246758] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2908.252048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2908.257777] ? find_next_bit+0x107/0x130 [ 2908.261863] blk_mq_init_tags+0x17b/0x2c0 [ 2908.266031] blk_mq_alloc_rq_map+0x88/0x200 [ 2908.270366] ? do_raw_spin_trylock+0x270/0x270 [ 2908.274965] blk_mq_init_sched+0x20c/0x750 [ 2908.279222] elevator_init_mq+0xcd/0x160 [ 2908.283300] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2908.288609] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2908.293117] ? blk_alloc_queue_node+0x663/0x920 [ 2908.297803] ? blk_set_queue_dying+0x70/0x70 [ 2908.302240] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2908.307453] ? __fget+0x472/0x710 [ 2908.311062] blk_mq_init_queue+0x62/0xb0 [ 2908.315149] loop_add+0x35e/0xa30 [ 2908.318615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2908.324244] ? loop_queue_rq+0x730/0x730 [ 2908.328323] ? rcu_read_unlock_special+0x380/0x380 [ 2908.333280] loop_control_ioctl+0x286/0x470 [ 2908.337617] ? loop_add+0xa30/0xa30 [ 2908.341263] ? iterate_fd+0x4b0/0x4b0 [ 2908.345082] ? loop_add+0xa30/0xa30 [ 2908.348720] do_vfs_ioctl+0x107b/0x17d0 [ 2908.352719] ? memset+0x32/0x40 [ 2908.356015] ? ioctl_preallocate+0x2f0/0x2f0 [ 2908.360452] ? smack_inode_setattr+0x290/0x290 [ 2908.365052] ? __fget_light+0x2db/0x420 [ 2908.369054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2908.374599] ? fput+0x128/0x1a0 [ 2908.377891] ? do_syscall_64+0x8c/0x800 [ 2908.381877] ? do_syscall_64+0x8c/0x800 [ 2908.385860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2908.391410] ? security_file_ioctl+0x93/0xc0 [ 2908.395841] ksys_ioctl+0xab/0xd0 [ 2908.399311] __x64_sys_ioctl+0x73/0xb0 [ 2908.403211] do_syscall_64+0x1a3/0x800 [ 2908.407136] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2908.412087] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2908.417122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2908.421990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2908.424370] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2908.427189] RIP: 0033:0x457ec9 [ 2908.427206] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2908.427213] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2908.465152] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2908.472438] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 03:41:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0xff000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x1a0ffffffff, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2908.479721] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2908.487001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2908.494279] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:43 executing program 4 (fault-call:2 fault-nth:41): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2908.574055] input: syz1 as /devices/virtual/input/input4870 03:41:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000011f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffedf, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = semget$private(0x0, 0x7, 0x20) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x208000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x8, 0x30, 0x1f, 0x10001}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={r3, 0x2, 0x4, 0x7fff}, 0x10) semctl$IPC_RMID(r1, 0x0, 0x0) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@generic={0x0, 0x20, 0x4}) [ 2908.624758] input: syz1 as /devices/virtual/input/input4871 [ 2908.669842] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2908.707094] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x2a021fbef39, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2908.726957] FAULT_INJECTION: forcing a failure. [ 2908.726957] name failslab, interval 1, probability 0, space 0, times 0 [ 2908.769066] CPU: 1 PID: 28762 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2908.776298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2908.785771] Call Trace: [ 2908.788373] dump_stack+0x1db/0x2d0 [ 2908.792023] ? dump_stack_print_info.cold+0x20/0x20 [ 2908.797055] ? save_stack+0x45/0xd0 [ 2908.800689] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2908.805796] ? kasan_kmalloc+0x9/0x10 [ 2908.809602] ? blk_mq_alloc_rq_map+0xb9/0x200 [ 2908.814113] should_fail.cold+0xa/0x15 [ 2908.818018] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2908.823135] ? ___might_sleep+0x1e7/0x310 [ 2908.827406] ? arch_local_save_flags+0x50/0x50 [ 2908.831998] ? __lock_is_held+0xb6/0x140 [ 2908.836079] __should_failslab+0x121/0x190 [ 2908.840320] should_failslab+0x9/0x14 [ 2908.844129] kmem_cache_alloc_node_trace+0x270/0x720 [ 2908.849241] ? kasan_unpoison_shadow+0x35/0x50 [ 2908.853836] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2908.858950] __kmalloc_node+0x3d/0x70 [ 2908.862776] blk_mq_alloc_rq_map+0xfa/0x200 [ 2908.867102] ? do_raw_spin_trylock+0x270/0x270 [ 2908.871699] blk_mq_init_sched+0x20c/0x750 [ 2908.875954] elevator_init_mq+0xcd/0x160 [ 2908.880025] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2908.885333] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2908.889848] ? blk_alloc_queue_node+0x663/0x920 [ 2908.894525] ? blk_set_queue_dying+0x70/0x70 [ 2908.898952] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2908.904238] ? __fget+0x472/0x710 [ 2908.907702] blk_mq_init_queue+0x62/0xb0 [ 2908.911787] loop_add+0x35e/0xa30 [ 2908.915245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2908.920795] ? loop_queue_rq+0x730/0x730 [ 2908.924868] ? rcu_read_unlock_special+0x380/0x380 [ 2908.929817] loop_control_ioctl+0x286/0x470 [ 2908.934152] ? loop_add+0xa30/0xa30 [ 2908.937793] ? iterate_fd+0x4b0/0x4b0 [ 2908.941618] ? loop_add+0xa30/0xa30 [ 2908.945253] do_vfs_ioctl+0x107b/0x17d0 [ 2908.949240] ? memset+0x32/0x40 [ 2908.953046] ? ioctl_preallocate+0x2f0/0x2f0 [ 2908.957479] ? smack_inode_setattr+0x290/0x290 [ 2908.962249] ? __fget_light+0x2db/0x420 [ 2908.966238] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2908.971782] ? fput+0x128/0x1a0 [ 2908.975067] ? do_syscall_64+0x8c/0x800 [ 2908.979048] ? do_syscall_64+0x8c/0x800 [ 2908.983032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2908.988577] ? security_file_ioctl+0x93/0xc0 [ 2908.992997] ksys_ioctl+0xab/0xd0 [ 2908.996460] __x64_sys_ioctl+0x73/0xb0 [ 2909.000357] do_syscall_64+0x1a3/0x800 [ 2909.004264] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2909.009205] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2909.014233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2909.019089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2909.024279] RIP: 0033:0x457ec9 [ 2909.027475] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2909.046393] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2909.054106] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2909.061388] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 03:41:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x100000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2909.068658] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2909.075926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2909.083282] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:43 executing program 4 (fault-call:2 fault-nth:42): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000021f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) sendto$inet(r0, 0x0, 0x32, 0x200007fd, &(0x7f0000000200)={0x2, 0xe23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xe741e2619fe5ee0f) fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0x44e8a70c) 03:41:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x7ffffffff000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2909.229111] input: syz1 as /devices/virtual/input/input4872 [ 2909.252446] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2909.263226] FAULT_INJECTION: forcing a failure. [ 2909.263226] name failslab, interval 1, probability 0, space 0, times 0 [ 2909.282870] input: syz0 as /devices/virtual/input/input4873 [ 2909.285472] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2909.303561] CPU: 0 PID: 28774 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2909.310789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2909.320151] Call Trace: [ 2909.322754] dump_stack+0x1db/0x2d0 [ 2909.326406] ? dump_stack_print_info.cold+0x20/0x20 [ 2909.331452] should_fail.cold+0xa/0x15 [ 2909.335391] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2909.340515] ? ___might_sleep+0x1e7/0x310 [ 2909.344677] ? arch_local_save_flags+0x50/0x50 [ 2909.349278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2909.354832] ? sbitmap_queue_init_node+0xc9/0x8c0 [ 2909.359702] __should_failslab+0x121/0x190 [ 2909.363953] should_failslab+0x9/0x14 [ 2909.367769] kmem_cache_alloc_node_trace+0x270/0x720 [ 2909.372889] ? find_next_bit+0x107/0x130 [ 2909.376974] __kmalloc_node+0x3d/0x70 [ 2909.380787] blk_mq_alloc_rq_map+0xb9/0x200 [ 2909.385115] ? do_raw_spin_trylock+0x270/0x270 [ 2909.389717] blk_mq_init_sched+0x20c/0x750 [ 2909.393977] elevator_init_mq+0xcd/0x160 [ 2909.398058] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2909.403372] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2909.407876] ? blk_alloc_queue_node+0x663/0x920 [ 2909.412562] ? blk_set_queue_dying+0x70/0x70 [ 2909.417003] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2909.422208] ? __fget+0x472/0x710 [ 2909.425694] blk_mq_init_queue+0x62/0xb0 [ 2909.429778] loop_add+0x35e/0xa30 [ 2909.433238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2909.438791] ? loop_queue_rq+0x730/0x730 [ 2909.442865] ? rcu_read_unlock_special+0x380/0x380 [ 2909.447815] loop_control_ioctl+0x286/0x470 [ 2909.452147] ? loop_add+0xa30/0xa30 [ 2909.455793] ? iterate_fd+0x4b0/0x4b0 [ 2909.459611] ? loop_add+0xa30/0xa30 [ 2909.463246] do_vfs_ioctl+0x107b/0x17d0 [ 2909.467230] ? memset+0x32/0x40 [ 2909.470519] ? ioctl_preallocate+0x2f0/0x2f0 [ 2909.474940] ? smack_inode_setattr+0x290/0x290 [ 2909.479537] ? __fget_light+0x2db/0x420 [ 2909.483532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2909.489080] ? fput+0x128/0x1a0 [ 2909.492371] ? do_syscall_64+0x8c/0x800 [ 2909.496360] ? do_syscall_64+0x8c/0x800 [ 2909.500357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2909.505904] ? security_file_ioctl+0x93/0xc0 [ 2909.510335] ksys_ioctl+0xab/0xd0 [ 2909.513808] __x64_sys_ioctl+0x73/0xb0 [ 2909.517712] do_syscall_64+0x1a3/0x800 [ 2909.521623] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2909.526566] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2909.531616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2909.536515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2909.541723] RIP: 0033:0x457ec9 [ 2909.544946] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2909.563855] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2909.571571] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 03:41:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x5000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2909.578853] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2909.586145] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2909.593429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2909.600706] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:44 executing program 4 (fault-call:2 fault-nth:43): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) ioctl$sock_proto_private(r0, 0x89e6, &(0x7f0000000200)="e1d804cdee7f02fae9871b22b751d5beebae45f427592892a253cc59a5152a77e5f5040e28361c9eee84eba56c916d4644bfcdccc384e418707af89f1941a2d2f96ac6c12d4123d79a00f3bde1670384e72b7c21a53b3361c7149a300541781c4a4461b23185f6a07fd45c59227312a91c27ce4bee48600cb15dc388a1f89e706a1b1e66ad0630bcbac6404ae6f8a45237d9d163c2d4b7263145f0e3517c0e4425ba447b2c47e07c3ced3b4ef19651be7c93342c27b0e7c24a43a51a90a9aec2feb5dd756ee6489a42aa4a380af502518904a6470681fce1c4e098e24591f2") sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x200000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x8000a0ffffffff, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000041f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2909.848401] FAULT_INJECTION: forcing a failure. [ 2909.848401] name failslab, interval 1, probability 0, space 0, times 0 [ 2909.851676] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2909.886032] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2909.910155] input: syz1 as /devices/virtual/input/input4874 [ 2909.921168] CPU: 1 PID: 28792 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2909.928389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2909.937758] Call Trace: [ 2909.940366] dump_stack+0x1db/0x2d0 [ 2909.944015] ? dump_stack_print_info.cold+0x20/0x20 [ 2909.949060] ? save_stack+0x45/0xd0 [ 2909.952711] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 03:41:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x300000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xf0ffffff7f0000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) msgget$private(0x0, 0x281) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x13f, 0x1}}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = socket$inet6(0xa, 0x80806, 0xc29) sendto(r1, &(0x7f0000000240)="d5582a78b07c3237d52d", 0xfffffd06, 0x10, 0x0, 0xffffffffffffff4d) [ 2909.952727] ? kasan_kmalloc+0x9/0x10 [ 2909.952746] ? blk_mq_alloc_rq_map+0xb9/0x200 [ 2909.961648] should_fail.cold+0xa/0x15 [ 2909.961669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2909.961693] ? ___might_sleep+0x1e7/0x310 [ 2909.975155] ? arch_local_save_flags+0x50/0x50 [ 2909.975174] ? __lock_is_held+0xb6/0x140 [ 2909.975198] __should_failslab+0x121/0x190 [ 2909.975215] should_failslab+0x9/0x14 [ 2909.975233] kmem_cache_alloc_node_trace+0x270/0x720 [ 2909.983963] ? kasan_unpoison_shadow+0x35/0x50 [ 2909.983982] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2909.984003] __kmalloc_node+0x3d/0x70 [ 2909.984022] blk_mq_alloc_rq_map+0xfa/0x200 [ 2909.984038] ? do_raw_spin_trylock+0x270/0x270 [ 2909.992317] blk_mq_init_sched+0x20c/0x750 [ 2909.992349] elevator_init_mq+0xcd/0x160 [ 2910.001319] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2910.001355] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2910.010999] ? blk_alloc_queue_node+0x663/0x920 [ 2910.011021] ? blk_set_queue_dying+0x70/0x70 [ 2910.011057] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2910.056078] ? __fget+0x472/0x710 [ 2910.059537] blk_mq_init_queue+0x62/0xb0 [ 2910.063630] loop_add+0x35e/0xa30 [ 2910.067090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2910.072621] ? loop_queue_rq+0x730/0x730 [ 2910.076676] ? rcu_read_unlock_special+0x380/0x380 [ 2910.081611] loop_control_ioctl+0x286/0x470 [ 2910.085920] ? loop_add+0xa30/0xa30 [ 2910.089540] ? iterate_fd+0x4b0/0x4b0 [ 2910.093346] ? loop_add+0xa30/0xa30 [ 2910.096976] do_vfs_ioctl+0x107b/0x17d0 [ 2910.100942] ? memset+0x32/0x40 [ 2910.104220] ? ioctl_preallocate+0x2f0/0x2f0 [ 2910.108641] ? smack_inode_setattr+0x290/0x290 [ 2910.113221] ? __fget_light+0x2db/0x420 [ 2910.117187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2910.122730] ? fput+0x128/0x1a0 [ 2910.125996] ? do_syscall_64+0x8c/0x800 [ 2910.129954] ? do_syscall_64+0x8c/0x800 [ 2910.133916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2910.139442] ? security_file_ioctl+0x93/0xc0 [ 2910.143843] ksys_ioctl+0xab/0xd0 [ 2910.147288] __x64_sys_ioctl+0x73/0xb0 [ 2910.151167] do_syscall_64+0x1a3/0x800 [ 2910.155067] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2910.160001] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2910.165012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2910.169857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2910.175037] RIP: 0033:0x457ec9 [ 2910.178216] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2910.197103] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:41:44 executing program 4 (fault-call:2 fault-nth:44): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2910.204810] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2910.212078] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2910.219360] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2910.226626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2910.233888] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000051f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2910.371101] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2910.400831] FAULT_INJECTION: forcing a failure. [ 2910.400831] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:41:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x100000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x400000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2910.433677] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2910.443259] CPU: 1 PID: 28806 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2910.450485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2910.459868] Call Trace: [ 2910.462491] dump_stack+0x1db/0x2d0 [ 2910.466180] ? dump_stack_print_info.cold+0x20/0x20 [ 2910.471218] ? rcu_read_unlock_special+0x380/0x380 [ 2910.476183] should_fail.cold+0xa/0x15 [ 2910.480100] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2910.485218] ? check_preemption_disabled+0x48/0x290 [ 2910.490265] ? arch_local_save_flags+0x50/0x50 [ 2910.494864] ? __lock_is_held+0xb6/0x140 [ 2910.498951] should_fail_alloc_page+0x50/0x60 [ 2910.503485] __alloc_pages_nodemask+0x323/0xdc0 [ 2910.508159] ? save_stack+0x45/0xd0 [ 2910.511792] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2910.516910] ? kasan_kmalloc+0x9/0x10 [ 2910.520725] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2910.525747] ? ksys_ioctl+0xab/0xd0 [ 2910.529374] ? __x64_sys_ioctl+0x73/0xb0 [ 2910.533444] ? do_syscall_64+0x1a3/0x800 [ 2910.537525] ? loop_init_request+0x83/0x180 [ 2910.541863] ? loop_info64_from_compat+0x930/0x930 [ 2910.546814] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 2910.551670] blk_mq_alloc_rqs+0x2f4/0xa30 [ 2910.555846] ? blk_mq_alloc_rq_map+0x200/0x200 [ 2910.560442] ? kasan_kmalloc+0x9/0x10 [ 2910.564265] ? blk_mq_alloc_rq_map+0x12f/0x200 [ 2910.568876] blk_mq_init_sched+0x266/0x750 [ 2910.573129] elevator_init_mq+0xcd/0x160 [ 2910.577201] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2910.582506] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2910.587010] ? blk_alloc_queue_node+0x663/0x920 [ 2910.591688] ? blk_set_queue_dying+0x70/0x70 [ 2910.596122] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2910.601318] ? __fget+0x472/0x710 [ 2910.604794] blk_mq_init_queue+0x62/0xb0 [ 2910.608864] loop_add+0x35e/0xa30 [ 2910.612320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2910.617866] ? loop_queue_rq+0x730/0x730 [ 2910.621938] ? rcu_read_unlock_special+0x380/0x380 [ 2910.626885] loop_control_ioctl+0x286/0x470 [ 2910.631213] ? loop_add+0xa30/0xa30 [ 2910.634858] ? iterate_fd+0x4b0/0x4b0 [ 2910.638669] ? loop_add+0xa30/0xa30 [ 2910.642307] do_vfs_ioctl+0x107b/0x17d0 [ 2910.646293] ? memset+0x32/0x40 [ 2910.649582] ? ioctl_preallocate+0x2f0/0x2f0 [ 2910.654006] ? smack_inode_setattr+0x290/0x290 [ 2910.658594] ? __fget_light+0x2db/0x420 [ 2910.662586] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2910.668129] ? fput+0x128/0x1a0 [ 2910.671418] ? do_syscall_64+0x8c/0x800 [ 2910.675416] ? do_syscall_64+0x8c/0x800 [ 2910.679404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2910.684947] ? security_file_ioctl+0x93/0xc0 [ 2910.689369] ksys_ioctl+0xab/0xd0 [ 2910.692850] __x64_sys_ioctl+0x73/0xb0 [ 2910.696837] do_syscall_64+0x1a3/0x800 [ 2910.700734] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2910.705671] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2910.710702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2910.715593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2910.720783] RIP: 0033:0x457ec9 [ 2910.723988] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2910.742982] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2910.750784] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2910.758061] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2910.765338] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2910.772610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 03:41:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x240003, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x8000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r2, 0xc5, 0x20, 0x2, 0x8}, &(0x7f0000000280)=0x18) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2910.779884] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:45 executing program 4 (fault-call:2 fault-nth:45): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000081f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2910.893738] input: syz1 as /devices/virtual/input/input4876 [ 2910.915438] input: syz1 as /devices/virtual/input/input4877 [ 2910.923580] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2910.961261] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x200000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x500000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='dctcp\x00', 0xffffffffffffff8a) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) sched_yield() setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) r1 = dup3(r0, r0, 0x80000) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x0, 0x508, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80101}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d4000000", @ANYRES16=r2, @ANYBLOB="11002dbd7000fbdbdf250b0000000c00060008000100050000002c0009000800020005000000080002000000040008000100ffffffff080002000200000008000200070000005400090008000100ff0f00000800020001800000080002000100000008000200ff07000008130fe22a000000080002000400000008000100000800000800020040680000080002008001000008000200fe0000000800020004000400100007000c000400050000000000006048a8a0a77ed379849bca97f892000c00020008000100030000001000f50630db6bef3b9ea9be67ed126d0502873a9c903f578f"], 0xd4}, 0x1, 0x0, 0x0, 0x4000}, 0x8001) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000740)={&(0x7f0000000500)={0x224, r2, 0x201, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa74}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc74}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f60}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x43d1fa12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4c}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x212}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x502b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x8, 0x4, [@TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x400c840}, 0x8880) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) 03:41:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2911.117941] FAULT_INJECTION: forcing a failure. [ 2911.117941] name failslab, interval 1, probability 0, space 0, times 0 [ 2911.163139] CPU: 0 PID: 28829 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2911.170839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2911.180207] Call Trace: [ 2911.182793] dump_stack+0x1db/0x2d0 [ 2911.186434] ? dump_stack_print_info.cold+0x20/0x20 [ 2911.191493] should_fail.cold+0xa/0x15 [ 2911.195405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2911.200544] ? ___might_sleep+0x1e7/0x310 [ 2911.204716] ? arch_local_save_flags+0x50/0x50 [ 2911.209321] __should_failslab+0x121/0x190 [ 2911.213571] should_failslab+0x9/0x14 [ 2911.217393] kmem_cache_alloc_node_trace+0x270/0x720 [ 2911.222530] dd_init_queue+0xfd/0x5f0 [ 2911.226349] ? dd_exit_queue+0x230/0x230 [ 2911.230428] ? kasan_kmalloc+0x9/0x10 [ 2911.234254] ? blk_mq_alloc_rq_map+0x12f/0x200 [ 2911.238855] blk_mq_init_sched+0x3a2/0x750 [ 2911.243113] elevator_init_mq+0xcd/0x160 [ 2911.247197] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2911.252503] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2911.257009] ? blk_alloc_queue_node+0x663/0x920 [ 2911.261697] ? blk_set_queue_dying+0x70/0x70 [ 2911.266140] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2911.271358] ? __fget+0x472/0x710 [ 2911.274823] blk_mq_init_queue+0x62/0xb0 [ 2911.278896] loop_add+0x35e/0xa30 [ 2911.282357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2911.287908] ? loop_queue_rq+0x730/0x730 [ 2911.291983] ? rcu_read_unlock_special+0x380/0x380 [ 2911.296934] loop_control_ioctl+0x286/0x470 [ 2911.301270] ? loop_add+0xa30/0xa30 [ 2911.304915] ? iterate_fd+0x4b0/0x4b0 [ 2911.309075] ? loop_add+0xa30/0xa30 [ 2911.312708] do_vfs_ioctl+0x107b/0x17d0 [ 2911.316706] ? memset+0x32/0x40 [ 2911.319996] ? ioctl_preallocate+0x2f0/0x2f0 [ 2911.324416] ? smack_inode_setattr+0x290/0x290 [ 2911.329100] ? __fget_light+0x2db/0x420 [ 2911.333092] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2911.338642] ? fput+0x128/0x1a0 [ 2911.341929] ? do_syscall_64+0x8c/0x800 [ 2911.345913] ? do_syscall_64+0x8c/0x800 [ 2911.349896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2911.355446] ? security_file_ioctl+0x93/0xc0 [ 2911.359869] ksys_ioctl+0xab/0xd0 [ 2911.363340] __x64_sys_ioctl+0x73/0xb0 [ 2911.367271] do_syscall_64+0x1a3/0x800 [ 2911.371184] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2911.376123] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2911.381161] ? __switch_to_asm+0x34/0x70 [ 2911.385235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2911.390097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2911.395293] RIP: 0033:0x457ec9 03:41:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000040091f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x300000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2911.398490] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2911.417504] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2911.425232] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2911.432509] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2911.439787] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2911.447164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2911.454444] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:46 executing program 4 (fault-call:2 fault-nth:46): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:46 executing program 0: r0 = socket$inet(0x2, 0x4, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@loopback, @broadcast}, 0x8) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x1) socket$caif_stream(0x25, 0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xc8, r2, 0x5, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x238d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x400000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2911.545161] input: syz1 as /devices/virtual/input/input4878 [ 2911.564839] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2911.577813] input: syz0 as /devices/virtual/input/input4879 03:41:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000101f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x600000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2911.612083] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2911.699042] FAULT_INJECTION: forcing a failure. [ 2911.699042] name failslab, interval 1, probability 0, space 0, times 0 [ 2911.722474] CPU: 1 PID: 28850 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2911.729708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2911.739067] Call Trace: [ 2911.741667] dump_stack+0x1db/0x2d0 [ 2911.745402] ? dump_stack_print_info.cold+0x20/0x20 [ 2911.750430] ? __lock_is_held+0xb6/0x140 [ 2911.754515] should_fail.cold+0xa/0x15 [ 2911.758416] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2911.763537] ? ___might_sleep+0x1e7/0x310 [ 2911.767694] ? arch_local_save_flags+0x50/0x50 [ 2911.772304] __should_failslab+0x121/0x190 [ 2911.776553] should_failslab+0x9/0x14 [ 2911.780365] kmem_cache_alloc_node_trace+0x270/0x720 [ 2911.785489] elevator_alloc+0x7d/0x170 [ 2911.789388] dd_init_queue+0x8e/0x5f0 [ 2911.793197] ? dd_exit_queue+0x230/0x230 [ 2911.797270] ? kasan_kmalloc+0x9/0x10 [ 2911.801088] ? blk_mq_alloc_rq_map+0x12f/0x200 [ 2911.805733] blk_mq_init_sched+0x3a2/0x750 [ 2911.810007] elevator_init_mq+0xcd/0x160 [ 2911.814079] blk_mq_init_allocated_queue+0x1343/0x1940 [ 2911.819382] ? blk_mq_map_swqueue+0xc00/0xc00 [ 2911.823889] ? blk_alloc_queue_node+0x663/0x920 [ 2911.828572] ? blk_set_queue_dying+0x70/0x70 [ 2911.833001] ? blk_mq_update_nr_hw_queues+0xf00/0xf00 [ 2911.838200] ? __fget+0x472/0x710 [ 2911.841666] blk_mq_init_queue+0x62/0xb0 [ 2911.845734] loop_add+0x35e/0xa30 [ 2911.849192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2911.854739] ? loop_queue_rq+0x730/0x730 [ 2911.858810] ? rcu_read_unlock_special+0x380/0x380 [ 2911.863762] loop_control_ioctl+0x286/0x470 [ 2911.868089] ? loop_add+0xa30/0xa30 [ 2911.871734] ? iterate_fd+0x4b0/0x4b0 [ 2911.875548] ? loop_add+0xa30/0xa30 [ 2911.879184] do_vfs_ioctl+0x107b/0x17d0 [ 2911.883173] ? memset+0x32/0x40 [ 2911.886458] ? ioctl_preallocate+0x2f0/0x2f0 [ 2911.890871] ? smack_inode_setattr+0x290/0x290 [ 2911.895722] ? __fget_light+0x2db/0x420 [ 2911.899711] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2911.905252] ? fput+0x128/0x1a0 [ 2911.908537] ? do_syscall_64+0x8c/0x800 [ 2911.912514] ? do_syscall_64+0x8c/0x800 [ 2911.916499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2911.922042] ? security_file_ioctl+0x93/0xc0 [ 2911.926459] ksys_ioctl+0xab/0xd0 [ 2911.929921] __x64_sys_ioctl+0x73/0xb0 [ 2911.933815] do_syscall_64+0x1a3/0x800 [ 2911.937714] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2911.942651] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2911.947717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2911.952606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2911.957815] RIP: 0033:0x457ec9 [ 2911.961021] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2911.980014] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2911.987739] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 03:41:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2911.995016] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2912.002287] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2912.009734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2912.017007] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:46 executing program 4 (fault-call:2 fault-nth:47): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x600000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000000201f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2912.136623] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2912.191013] FAULT_INJECTION: forcing a failure. [ 2912.191013] name failslab, interval 1, probability 0, space 0, times 0 [ 2912.203689] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2912.210586] CPU: 1 PID: 28864 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2912.219046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2912.228409] Call Trace: [ 2912.231008] dump_stack+0x1db/0x2d0 [ 2912.234659] ? dump_stack_print_info.cold+0x20/0x20 [ 2912.239685] ? wait_for_completion+0x810/0x810 [ 2912.244288] should_fail.cold+0xa/0x15 [ 2912.248190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2912.253395] ? ___might_sleep+0x1e7/0x310 [ 2912.257555] ? arch_local_save_flags+0x50/0x50 [ 2912.262157] __should_failslab+0x121/0x190 [ 2912.266398] should_failslab+0x9/0x14 [ 2912.270205] kmem_cache_alloc_node_trace+0x270/0x720 [ 2912.275413] ? blk_set_queue_dying+0x70/0x70 [ 2912.279837] __alloc_disk_node+0xc3/0x530 [ 2912.283999] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 2912.288691] loop_add+0x431/0xa30 [ 2912.292148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2912.297798] ? loop_queue_rq+0x730/0x730 [ 2912.301871] ? rcu_read_unlock_special+0x380/0x380 [ 2912.306909] loop_control_ioctl+0x286/0x470 [ 2912.311237] ? loop_add+0xa30/0xa30 [ 2912.314883] ? iterate_fd+0x4b0/0x4b0 [ 2912.318691] ? loop_add+0xa30/0xa30 [ 2912.322325] do_vfs_ioctl+0x107b/0x17d0 [ 2912.326307] ? memset+0x32/0x40 [ 2912.329595] ? ioctl_preallocate+0x2f0/0x2f0 [ 2912.334014] ? smack_inode_setattr+0x290/0x290 [ 2912.338602] ? __fget_light+0x2db/0x420 [ 2912.342594] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2912.348139] ? fput+0x128/0x1a0 [ 2912.351423] ? do_syscall_64+0x8c/0x800 [ 2912.355402] ? do_syscall_64+0x8c/0x800 [ 2912.359394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2912.364941] ? security_file_ioctl+0x93/0xc0 [ 2912.369363] ksys_ioctl+0xab/0xd0 [ 2912.372836] __x64_sys_ioctl+0x73/0xb0 [ 2912.376730] do_syscall_64+0x1a3/0x800 [ 2912.380625] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2912.385564] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2912.390592] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2912.395455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2912.400647] RIP: 0033:0x457ec9 [ 2912.403847] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2912.422749] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2912.430460] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 03:41:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x700000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2912.437733] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2912.445011] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2912.452280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2912.459551] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) sendto$inet(r0, &(0x7f0000000180)="5e90e7477f03a2c95d94100d61", 0xd, 0x8000, &(0x7f0000000200)={0x2, 0x4e24, @broadcast}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x22001, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000380)=0x803, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x3, 0x2) accept4$unix(r2, &(0x7f0000000280), &(0x7f0000000300)=0x6e, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window={0x3, 0x79e, 0x5}, @sack_perm, @mss={0x2, 0x8b}, @window={0x3, 0x7}, @window={0x3, 0x6}], 0x5) 03:41:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x700000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:47 executing program 4 (fault-call:2 fault-nth:48): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 2912.645967] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000000000003f1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2912.700409] input: syz1 as /devices/virtual/input/input4882 [ 2912.711895] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2912.735463] input: syz1 as /devices/virtual/input/input4883 [ 2912.782234] FAULT_INJECTION: forcing a failure. [ 2912.782234] name failslab, interval 1, probability 0, space 0, times 0 03:41:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 2912.860116] CPU: 0 PID: 28888 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2912.868052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2912.877421] Call Trace: [ 2912.880038] dump_stack+0x1db/0x2d0 [ 2912.883693] ? dump_stack_print_info.cold+0x20/0x20 [ 2912.888734] ? pcpu_alloc+0x4c6/0x1600 [ 2912.892663] should_fail.cold+0xa/0x15 [ 2912.896571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2912.901698] ? ___might_sleep+0x1e7/0x310 [ 2912.905864] ? arch_local_save_flags+0x50/0x50 [ 2912.910474] __should_failslab+0x121/0x190 [ 2912.914725] should_failslab+0x9/0x14 [ 2912.918544] kmem_cache_alloc_node_trace+0x270/0x720 [ 2912.923686] ? lockdep_init_map+0x10c/0x5b0 [ 2912.928035] __kmalloc_node+0x3d/0x70 [ 2912.931857] disk_expand_part_tbl+0x244/0x3d0 [ 2912.936366] ? blk_free_devt+0x60/0x60 [ 2912.940297] __alloc_disk_node+0x176/0x530 [ 2912.944580] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 2912.949266] ? __fget+0x472/0x710 [ 2912.953202] loop_add+0x431/0xa30 [ 2912.956673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2912.962227] ? loop_queue_rq+0x730/0x730 [ 2912.966311] ? rcu_read_unlock_special+0x380/0x380 [ 2912.971271] loop_control_ioctl+0x286/0x470 [ 2912.975616] ? loop_add+0xa30/0xa30 [ 2912.979251] ? iterate_fd+0x4b0/0x4b0 [ 2912.983066] ? loop_add+0xa30/0xa30 [ 2912.986705] do_vfs_ioctl+0x107b/0x17d0 [ 2912.990695] ? memset+0x32/0x40 [ 2912.993989] ? ioctl_preallocate+0x2f0/0x2f0 [ 2912.998422] ? smack_inode_setattr+0x290/0x290 [ 2913.003026] ? __fget_light+0x2db/0x420 03:41:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2913.007030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2913.012582] ? fput+0x128/0x1a0 [ 2913.015874] ? do_syscall_64+0x8c/0x800 [ 2913.019861] ? do_syscall_64+0x8c/0x800 [ 2913.023854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2913.029404] ? security_file_ioctl+0x93/0xc0 [ 2913.033828] ksys_ioctl+0xab/0xd0 [ 2913.037307] __x64_sys_ioctl+0x73/0xb0 [ 2913.041223] do_syscall_64+0x1a3/0x800 [ 2913.045125] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2913.050061] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2913.055092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2913.059969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2913.065179] RIP: 0033:0x457ec9 [ 2913.068382] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2913.087402] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2913.095126] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2913.102403] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 03:41:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xa00000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000140)=0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='\x9cA\xbdv\xd9\x91\xd7b\xbc]\xaa\x9e\xbd|\x85\xe4\xab\x02O)\xc59d(9T1\xc7Xu\xa3G\xbb\x977\x8dUZ\x19\x9a\xe2\x83\xe0\\\xe1\x8d\xa0]\x8c\xac^I\xd6_\xf0H$\xf9&\xbb|\x99\x14\xc4\xf8=\xea\x98\xb9I9\x9b\xbd\xb0d\x16\xc4\xa0\xd9o\x89\xeb+9\x82c\xd4Y\x93\xbfD\xd8\x86]\xff\xd3\x1e\x8cn\xd1\xa6\x8d\xf7\xcbo\xac\x992u\x8b\xdd\x93\x10&\x8a', 0xa9) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000180)={0x1, 0x1, [0xffffff8000000000, 0x343, 0xfff, 0x0, 0x4e4, 0x100000000, 0x3f, 0x1000]}) [ 2913.109686] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2913.116965] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2913.124251] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:47 executing program 4 (fault-call:2 fault-nth:49): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000008000a01f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) [ 2913.218957] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2913.241325] input: syz1 as /devices/virtual/input/input4884 [ 2913.242286] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2913.288362] input: syz1 as /devices/virtual/input/input4885 03:41:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x6000000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2913.340244] FAULT_INJECTION: forcing a failure. [ 2913.340244] name failslab, interval 1, probability 0, space 0, times 0 [ 2913.363258] CPU: 1 PID: 28906 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2913.370570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2913.370579] Call Trace: [ 2913.382523] dump_stack+0x1db/0x2d0 [ 2913.386173] ? dump_stack_print_info.cold+0x20/0x20 [ 2913.391192] ? pcpu_alloc+0x160/0x1600 [ 2913.395101] should_fail.cold+0xa/0x15 [ 2913.398997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2913.399023] ? ___might_sleep+0x1e7/0x310 [ 2913.399038] ? arch_local_save_flags+0x50/0x50 [ 2913.412841] __should_failslab+0x121/0x190 [ 2913.417082] should_failslab+0x9/0x14 [ 2913.417100] kmem_cache_alloc_trace+0x2d1/0x760 [ 2913.417121] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 2913.431221] rand_initialize_disk+0x40/0xc0 [ 2913.435546] __alloc_disk_node+0x2c3/0x530 [ 2913.435563] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 2913.435592] loop_add+0x431/0xa30 [ 2913.444447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2913.444468] ? loop_queue_rq+0x730/0x730 [ 2913.444484] ? rcu_read_unlock_special+0x380/0x380 [ 2913.444512] loop_control_ioctl+0x286/0x470 [ 2913.457522] ? loop_add+0xa30/0xa30 [ 2913.457547] ? iterate_fd+0x4b0/0x4b0 [ 2913.457565] ? loop_add+0xa30/0xa30 [ 2913.474178] do_vfs_ioctl+0x107b/0x17d0 [ 2913.474196] ? memset+0x32/0x40 [ 2913.474213] ? ioctl_preallocate+0x2f0/0x2f0 [ 2913.481777] ? smack_inode_setattr+0x290/0x290 [ 2913.481791] ? __fget_light+0x2db/0x420 [ 2913.481815] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2913.494027] ? fput+0x128/0x1a0 [ 2913.494045] ? do_syscall_64+0x8c/0x800 [ 2913.494060] ? do_syscall_64+0x8c/0x800 [ 2913.494081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2913.520291] ? security_file_ioctl+0x93/0xc0 [ 2913.524710] ksys_ioctl+0xab/0xd0 [ 2913.528190] __x64_sys_ioctl+0x73/0xb0 [ 2913.532094] do_syscall_64+0x1a3/0x800 [ 2913.535997] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2913.540951] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2913.546100] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2913.551003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2913.556296] RIP: 0033:0x457ec9 [ 2913.559507] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2913.578412] RSP: 002b:00007fb4c501bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2913.586122] RAX: ffffffffffffffda RBX: 00007fb4c501bc90 RCX: 0000000000457ec9 [ 2913.593397] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2913.600671] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2913.608034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c501c6d4 [ 2913.615390] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xe00000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 03:41:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:48 executing program 4 (fault-call:2 fault-nth:50): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180), 0xfffffffffffffd2b) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x0, 0x420000010, 0x0, 0x272) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000280)={0x10, @time={0x77359400}, 0x8000, {0x1, 0x8}, 0x9, 0x1, 0x2000000000000000}) mkdir(&(0x7f0000000180)='./file0\x00', 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000200)={0x4ede73a4, 0x1, 0x81}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x200, 0x0) [ 2913.718486] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2913.754776] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000000001a01f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfeffff0700000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x1802000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2913.806599] input: syz1 as /devices/virtual/input/input4886 [ 2913.845991] input: syz1 as /devices/virtual/input/input4887 [ 2913.917947] FAULT_INJECTION: forcing a failure. [ 2913.917947] name failslab, interval 1, probability 0, space 0, times 0 [ 2913.980252] CPU: 1 PID: 28926 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2913.987497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2913.996864] Call Trace: [ 2913.999475] dump_stack+0x1db/0x2d0 [ 2914.003119] ? dump_stack_print_info.cold+0x20/0x20 [ 2914.008146] ? pcpu_alloc+0x160/0x1600 [ 2914.012056] should_fail.cold+0xa/0x15 [ 2914.015962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2914.021082] ? ___might_sleep+0x1e7/0x310 [ 2914.025239] ? arch_local_save_flags+0x50/0x50 [ 2914.029839] __should_failslab+0x121/0x190 [ 2914.034083] should_failslab+0x9/0x14 [ 2914.038018] kmem_cache_alloc_trace+0x2d1/0x760 [ 2914.042705] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 2914.048109] rand_initialize_disk+0x40/0xc0 [ 2914.052437] __alloc_disk_node+0x2c3/0x530 [ 2914.056677] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 2914.061356] ? __fget+0x472/0x710 [ 2914.064829] loop_add+0x431/0xa30 [ 2914.068297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2914.073846] ? loop_queue_rq+0x730/0x730 [ 2914.077912] ? rcu_read_unlock_special+0x380/0x380 [ 2914.082883] loop_control_ioctl+0x286/0x470 [ 2914.087218] ? loop_add+0xa30/0xa30 [ 2914.090857] ? iterate_fd+0x4b0/0x4b0 [ 2914.094667] ? loop_add+0xa30/0xa30 [ 2914.098315] do_vfs_ioctl+0x107b/0x17d0 [ 2914.102299] ? memset+0x32/0x40 [ 2914.105599] ? ioctl_preallocate+0x2f0/0x2f0 [ 2914.110015] ? smack_inode_setattr+0x290/0x290 [ 2914.114606] ? __fget_light+0x2db/0x420 [ 2914.119133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2914.124686] ? fput+0x128/0x1a0 [ 2914.127971] ? do_syscall_64+0x8c/0x800 [ 2914.131954] ? do_syscall_64+0x8c/0x800 [ 2914.135946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2914.141497] ? security_file_ioctl+0x93/0xc0 [ 2914.145923] ksys_ioctl+0xab/0xd0 [ 2914.149384] __x64_sys_ioctl+0x73/0xb0 [ 2914.153279] do_syscall_64+0x1a3/0x800 [ 2914.157177] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2914.162114] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2914.167135] ? __switch_to_asm+0x34/0x70 [ 2914.171210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2914.176075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2914.181265] RIP: 0033:0x457ec9 [ 2914.184548] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2914.203473] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2914.211182] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2914.218452] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 03:41:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x202000, 0x0) sendmsg$unix(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000180)="e9b491ea085ac566693fccc2c383ad5cb03cc34e738f0b1aa3684f16f89fb883ef8a", 0x22}, {&(0x7f0000000280)="ff44ca7ab3f9f31dfd89da4da7e4311fe6182758843e94fb5959c724897fe3fc8081de22a7adca16846bbdc7a030ad651907b4adf2e482edf2e8f5ac9b24aecd903e203f8709c360159e05c9a6c33caa76afc2d89b39d22d818abe7210aa162d3e95caa3b6db4125631a47336c8d6b4cb3bdb6c0fa4abe16232db874b52b6dcc90ad67398f9541fe90eb674a007e5d4ca6cd1f4f1b79a84d1559c7c563e44965313c278bac5f29e0b878794134bad5bdaf4e792775747d640c5bb09af186559e21c717295f32bd19737b16f1af34fa4e6e2eb8e080f104c0cafe2fc58d4e0d55b9201decf4d21413bf3de0d3f6b5ceae7ce4b230171e8a9e1e8cc1", 0xfb}], 0x2}, 0x20000000) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x1c2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:41:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d220000180000000303000000000300000000ffffffef1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x2000000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2914.225727] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2914.233002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2914.240287] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 03:41:48 executing program 4 (fault-call:2 fault-nth:51): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:41:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0xfffffffffffffcdc, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x4, 0x8001, 0x8, 0x1, 0xf64, 0x1d20, 0x8001, {0x0, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0xfc}}, 0x4, 0x4, 0x81, 0x5, 0x9}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r1, 0x7, 0x8, 0x7}, &(0x7f0000000340)=0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x410100, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000180)={0x1e4f, 0x0, 0x2023, 0x2, 0xff, {0x1, 0x8}}) [ 2914.348972] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2914.385189] input: syz1 as /devices/virtual/input/input4888 [ 2914.385344] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x39effb21a0020000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2914.425249] input: syz1 as /devices/virtual/input/input4889 03:41:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0xff00000000000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) 03:41:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000002000000400030006000d10022002002060fffdff0000000000000000000800120002000200000000007d2200001800000003030000000003000000007fffffff1f0300000016000000030100000000000000000000000000000000dd00030005000000000002000000000000000000000000000000"], 0x80}}, 0x0) 03:41:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:41:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 2914.584766] FAULT_INJECTION: forcing a failure. [ 2914.584766] name failslab, interval 1, probability 0, space 0, times 0 [ 2914.614662] CPU: 0 PID: 28950 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2914.621908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2914.631278] Call Trace: [ 2914.633894] dump_stack+0x1db/0x2d0 [ 2914.637552] ? dump_stack_print_info.cold+0x20/0x20 [ 2914.642609] should_fail.cold+0xa/0x15 [ 2914.646530] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2914.651665] ? ___might_sleep+0x1e7/0x310 [ 2914.655827] ? arch_local_save_flags+0x50/0x50 [ 2914.660437] __should_failslab+0x121/0x190 [ 2914.664690] should_failslab+0x9/0x14 [ 2914.668511] __kmalloc_track_caller+0x2d8/0x740 [ 2914.673188] ? pointer+0x930/0x930 [ 2914.677530] ? lockdep_init_map+0x10c/0x5b0 [ 2914.681859] ? kvasprintf_const+0x65/0x190 [ 2914.686119] kvasprintf+0xc8/0x170 [ 2914.689684] ? bust_spinlocks+0xe0/0xe0 [ 2914.693697] ? rcu_read_lock_sched_held+0x110/0x130 [ 2914.698733] kvasprintf_const+0x65/0x190 [ 2914.702813] kobject_set_name_vargs+0x5b/0x150 [ 2914.707413] device_create_groups_vargs+0x1b7/0x270 [ 2914.712455] device_create_vargs+0x45/0x60 [ 2914.716707] bdi_register_va.part.0+0xb6/0x980 [ 2914.721305] ? cgwb_kill+0x690/0x690 [ 2914.725163] ? lockdep_init_map+0x10c/0x5b0 [ 2914.729498] ? lockdep_init_map+0x10c/0x5b0 [ 2914.733835] ? __init_waitqueue_head+0x92/0x150 [ 2914.738519] ? init_wait_entry+0x1c0/0x1c0 [ 2914.742777] bdi_register+0x12a/0x140 [ 2914.746596] ? bdi_register_va+0x80/0x80 [ 2914.750704] ? put_dec+0xd0/0xd0 [ 2914.754082] ? format_decode+0x227/0xb00 [ 2914.758162] ? enable_ptr_key_workfn+0x30/0x30 [ 2914.762847] bdi_register_owner+0x61/0x110 [ 2914.767104] __device_add_disk+0xf63/0x13c0 [ 2914.771453] ? blk_alloc_devt+0x2e0/0x2e0 [ 2914.775618] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 2914.780996] ? sprintf+0xc0/0x100 [ 2914.784444] ? scnprintf+0x140/0x140 [ 2914.788151] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 2914.792813] device_add_disk+0x2b/0x40 [ 2914.796694] loop_add+0x71d/0xa30 [ 2914.800145] ? loop_queue_rq+0x730/0x730 [ 2914.804204] loop_control_ioctl+0x286/0x470 [ 2914.808532] ? loop_add+0xa30/0xa30 [ 2914.812155] ? iterate_fd+0x4b0/0x4b0 [ 2914.815945] ? loop_add+0xa30/0xa30 [ 2914.819559] do_vfs_ioctl+0x107b/0x17d0 [ 2914.823544] ? memset+0x32/0x40 [ 2914.826911] ? ioctl_preallocate+0x2f0/0x2f0 [ 2914.831307] ? smack_inode_setattr+0x290/0x290 [ 2914.835904] ? __fget_light+0x2db/0x420 [ 2914.839896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2914.845424] ? fput+0x128/0x1a0 [ 2914.848694] ? do_syscall_64+0x8c/0x800 [ 2914.852657] ? do_syscall_64+0x8c/0x800 [ 2914.856626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2914.862152] ? security_file_ioctl+0x93/0xc0 [ 2914.866548] ksys_ioctl+0xab/0xd0 [ 2914.869993] __x64_sys_ioctl+0x73/0xb0 [ 2914.873892] do_syscall_64+0x1a3/0x800 [ 2914.877767] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2914.882695] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2914.887700] ? __switch_to_asm+0x34/0x70 [ 2914.891787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2914.896711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2914.901885] RIP: 0033:0x457ec9 [ 2914.905067] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2914.924040] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:41:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3c00000000000000, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) [ 2914.931820] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2914.939083] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2914.946344] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2914.953834] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2914.961299] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2914.974219] kernel msg: ebtables bug: please report to author: Valid hook without chain 03:41:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000a20], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0xffffffff00000000}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'netdevsim0\x00', 'rose0\x00', 'ip6gre0\x00', 'netdevsim0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@random="7329d96d0740"}}}}]}]}, 0x1b0) [ 2915.014865] input: syz1 as /devices/virtual/input/input4890 [ 2915.050426] WARNING: CPU: 1 PID: 28950 at block/genhd.c:717 __device_add_disk+0x10eb/0x13c0 [ 2915.059056] Kernel panic - not syncing: panic_on_warn set ... [ 2915.063222] kobject: 'event4' (0000000073377363): kobject_uevent_env [ 2915.064956] CPU: 1 PID: 28950 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #27 [ 2915.071489] kobject: 'event4' (0000000073377363): fill_kobj_path: path = '/devices/virtual/input/input4890/event4' [ 2915.078693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2915.078699] Call Trace: [ 2915.078720] dump_stack+0x1db/0x2d0 [ 2915.078741] ? dump_stack_print_info.cold+0x20/0x20 [ 2915.109747] ? __device_add_disk+0x1060/0x13c0 [ 2915.114339] panic+0x2cb/0x65c [ 2915.117536] ? add_taint.cold+0x16/0x16 [ 2915.121628] ? __device_add_disk+0x10eb/0x13c0 [ 2915.123258] kobject: '(null)' (00000000d8e80db1): kobject_cleanup, parent 0000000073377363 [ 2915.126208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2915.140128] ? __probe_kernel_read+0x1f4/0x250 [ 2915.144717] ? __warn.cold+0x5/0x48 [ 2915.148370] ? __device_add_disk+0x10eb/0x13c0 [ 2915.152974] __warn.cold+0x20/0x48 [ 2915.153056] kobject: '(null)' (00000000d8e80db1): calling ktype release [ 2915.156524] ? __device_add_disk+0x10eb/0x13c0 [ 2915.167846] report_bug+0x263/0x2b0 [ 2915.171481] do_error_trap+0x11b/0x200 [ 2915.175377] do_invalid_op+0x37/0x50 [ 2915.179094] ? __device_add_disk+0x10eb/0x13c0 [ 2915.183686] invalid_op+0x14/0x20 [ 2915.187145] RIP: 0010:__device_add_disk+0x10eb/0x13c0 [ 2915.192337] Code: 4c 89 e7 e8 97 d1 45 fe e9 3a f0 ff ff e8 ed e5 01 fe 0f 0b e9 22 fb ff ff e8 e1 e5 01 fe 0f 0b e9 d3 f6 ff ff e8 d5 e5 01 fe <0f> 0b e9 86 fe ff ff e8 59 40 cb fd 48 8b bd c8 fe ff ff e8 3d d1 [ 2915.211324] RSP: 0018:ffff888084a0f940 EFLAGS: 00010246 [ 2915.216687] RAX: 0000000000040000 RBX: ffff888084a0fa98 RCX: ffffc9000e04c000 [ 2915.223959] RDX: 0000000000040000 RSI: ffffffff8380118b RDI: 0000000000000005 [ 2915.231227] RBP: ffff888084a0fac0 R08: ffff888085ea80c0 R09: ffffed1015ce5b90 [ 2915.238526] R10: ffffed1015ce5b8f R11: ffff8880ae72dc7b R12: ffff88805869c540 [ 2915.245794] R13: 00000000fffffff4 R14: ffff88805869c5d0 R15: 0000000000000000 [ 2915.253180] ? __device_add_disk+0x10eb/0x13c0 [ 2915.257805] ? blk_alloc_devt+0x2e0/0x2e0 [ 2915.261966] ? percpu_ref_noop_confirm_switch+0x10/0x10 [ 2915.267345] ? sprintf+0xc0/0x100 [ 2915.270806] ? scnprintf+0x140/0x140 [ 2915.274538] ? disk_expand_part_tbl+0x3d0/0x3d0 [ 2915.279215] device_add_disk+0x2b/0x40 [ 2915.283113] loop_add+0x71d/0xa30 [ 2915.286579] ? loop_queue_rq+0x730/0x730 [ 2915.290664] loop_control_ioctl+0x286/0x470 [ 2915.295006] ? loop_add+0xa30/0xa30 [ 2915.298643] ? iterate_fd+0x4b0/0x4b0 [ 2915.302455] ? loop_add+0xa30/0xa30 [ 2915.306086] do_vfs_ioctl+0x107b/0x17d0 [ 2915.310069] ? memset+0x32/0x40 [ 2915.313370] ? ioctl_preallocate+0x2f0/0x2f0 [ 2915.317782] ? smack_inode_setattr+0x290/0x290 [ 2915.322375] ? __fget_light+0x2db/0x420 [ 2915.326369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2915.331920] ? fput+0x128/0x1a0 [ 2915.335203] ? do_syscall_64+0x8c/0x800 [ 2915.339188] ? do_syscall_64+0x8c/0x800 [ 2915.343171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2915.348711] ? security_file_ioctl+0x93/0xc0 [ 2915.353126] ksys_ioctl+0xab/0xd0 [ 2915.356597] __x64_sys_ioctl+0x73/0xb0 [ 2915.360493] do_syscall_64+0x1a3/0x800 [ 2915.364385] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2915.369318] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2915.374352] ? __switch_to_asm+0x34/0x70 [ 2915.378511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2915.383366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2915.388556] RIP: 0033:0x457ec9 [ 2915.391752] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2915.410652] RSP: 002b:00007fb4c4ffac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2915.418360] RAX: ffffffffffffffda RBX: 00007fb4c4ffac90 RCX: 0000000000457ec9 [ 2915.425635] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000003 [ 2915.432904] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2915.440177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4c4ffb6d4 [ 2915.447448] R13: 00000000004c11c1 R14: 00000000004d2e88 R15: 0000000000000004 [ 2915.456469] Kernel Offset: disabled [ 2915.460436] Rebooting in 86400 seconds..