0x0, 0x201}]}) [ 1943.316963][T20431] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = dup2(r0, r0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x80000000}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x1, 0x4, "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", 0x7d, 0x0, 0x10000, 0xfff, 0x8000, 0x8548000000000000, 0x4}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x39, 0x100, {"cf034df5df6e9c3d5ee4c9892be25635"}, 0x6, 0x5c, 0x3f}}}, 0xa0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000440)={0x3, 0xfffffffffffffffc, 0x2, 0xf1c, 0x8, 0x1}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000540)="d603656dfbb7bfb992812ac55e423f86305909c890c40d1667b2e70216c305b1b590b7175c4cb2af92f9923fe9018b2ca98c726799e83ebd6c51dd0fc6c0f9c8fc53ef5c3ac2a33965bcf6e19a444f92c309e33a3d5e354105e8c2106c2a01a83daa124a851cc865141125be4780bcdcf7afd3c38063428be21ad248f8472114791ebe74fc06e5c3ac1cccc20df79cb1195acb30b818a7f3fa9628fde399fc5a7c36a5c7964fdf947e703325c8d140718d26fb8bc21eba2499ce56702f") ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000380)=0x5) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x41220166}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6231f50747b05493e7ababe039b055d807e1e602714a2bc85df598c5585e94e40e0754f4", @ANYRES16=r3, @ANYRES64=r1], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x8eec83eff3365a7d) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) 14:52:03 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0xf4ffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1943.361735][T20431] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) r3 = msgget$private(0x0, 0x280) msgrcv(r3, &(0x7f0000000200)={0x0, ""/93}, 0x65, 0x2, 0x3000) socket$kcm(0x29, 0x7, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:03 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x400) mq_timedsend(r1, &(0x7f0000000100)="b6c0094a35b3f8a66f0ef972bf0a0255637203a56b8db8002424b39e6a6ac388dbdb30946f12d1f0d8ef82cd486a72daae58efcdab79e42a6cf063c236d570c8e50bd3160c5e2fe6ee2ccc7eb2d2e9cf12146b396c20170f655926572e2a2ed991d1b49908443344b6527dc507c94008873ed023dba43dd2c18828706bc5c96f04fe0abd6922bbe746ca7ad6a79f73becd5ba125a052d16fcc0e6cd791ab5e0d1ab714a9f1a3d43bcab931346c964bffa853f2f34f19582e153070ad3c676e7b0743a784789ee4e95589969b461d4823a2f1395a163ef66a2c8202c32562b29b4b22014a1117d2902939707e8547d2722b0a02ec815a69", 0xf7, 0xffffffffffffffff, &(0x7f0000000200)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'vlan0\x00', 0x1}, 0x18) syz_open_dev$dspn(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x101000, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x440000, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000140)={r1, 0x1, 0x0, 0x1000000000000}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:03 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0xfeffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:03 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000040)={0x3, 0x200000000000000, 0xfffffffffffffffd, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(r1, 0x0, 0x0) 14:52:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0xfffffffffffffd79, 0xfa00, @id_resuseaddr={&(0x7f0000000240)=0x1, r1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) fcntl$setstatus(r0, 0x4, 0x2000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1943.670830][T20976] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1943.705834][T20976] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:04 executing program 5: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) [ 1943.897957][T21422] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1943.948043][T21422] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6={0xa, 0x4e20, 0xf1cd, @dev={0xfe, 0x80, [], 0x27}, 0xed9}}}, 0x90) socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x800, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f00000001c0)={0x5, 0x2, 0x5, 0x9}, 0x10) socket$bt_cmtp(0x1f, 0x3, 0x5) 14:52:04 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0xff0f000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:04 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x2300, 0x1) write$sndseq(r0, &(0x7f0000000080)=[{0x2, 0xfffffffffffffffb, 0x25616022, 0xaa48, @tick=0x4, {0x0, 0x1}, {0x9ce, 0x3}, @raw8={"53da2305455709e1666f7543"}}], 0x30) 14:52:04 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x100000000, 0xa580) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000000c0)={0x2, "2a75a2a3af4e3158f542ea12281ec67ad11877aa02aa4512d3df88e78c2a7e51", 0x0, 0x1, 0x445, 0x13, 0x7}) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000140)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000040)=""/62) sendmsg$can_bcm(r2, 0x0, 0x10) [ 1944.366610][T21614] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x561003, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x400, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x8004}, 0x4000805) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10030, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x42804028}, 0xc, &(0x7f00000003c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="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"], 0x238}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) [ 1944.408595][T21614] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x3c0, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0xfffffffffffffdd8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x117, 0xe2f79f040f51239b}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:04 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0xff1e010000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:04 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x144, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7a2c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x598f77}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0xe4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff0001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xeb5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb2e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4f}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffd7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffeffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe008}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x144}}, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000340)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x28) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000003c0)={r3, 0x5}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000400)='/dev/sg#\x00', 0x3, 0x0) 14:52:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) [ 1944.741594][T22029] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x1, r2, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:05 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) [ 1944.801869][T22029] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:05 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0xffffff7f00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0xfffffdb0, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x22}}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40803f, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000001c0)={'ip6_vti0\x00', @random="21c26f69fcd3"}) 14:52:05 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400000, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r1, 0x0, 0x8, 0x1000, 0x9}) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) 14:52:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:05 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:05 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0xc0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000540)={0x1f, 0x1ff, {0x93b6, 0x80000000, 0x5, 0x3, 0x8}, 0xf054, 0xcf}, 0xe) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x1, 0x0) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000200), &(0x7f0000000240)=0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {0xa, 0x1, 0x0, @rand_addr, 0xfff}, r2, 0x6}}, 0x48) fsync(r1) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:05 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0xffffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:05 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) sendto$inet6(r0, &(0x7f0000000100)="f3ba1ccbe35fc7f57fbcf71219c8049a6ef2af41987eaf41f72941170f73fbbcafbcdf406a25004193a87c0337e4afa7355a1d6c5c5ed7c3d8735be8d6652fc0f416f88fff4145ccca32724586563880cd0da9a5dceddd2a8979307d6f868ab69ef305f03372387133dc67341ab40e2728f673d1e90d6add01ff63b61dfa3a3d085e553fd6a1278562d7609b8da45c045b8a4bd10c8a067d087bd3cf9361fcea4fc1a3bf5d43e12abb674285e2bcec01db91c05b2a081a23e16df1d8c4fc82dc5c20b0b9cba32974265e71bc22558e24e7230af60e1d1cb02734b7efaa74ea7c3b0fde2e4c481c81f931579b", 0xec, 0x20000000, &(0x7f0000000000)={0xa, 0x4e24, 0x6, @local, 0x7}, 0x1c) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) [ 1945.426813][T22780] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:05 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4000fff, 0x80) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000100)={r2, 0x1}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) [ 1945.539680][T22964] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000200)=0x8001) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) r3 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) write$P9_RSTAT(r3, &(0x7f00000004c0)={0xa8, 0x7d, 0x2, {0x0, 0xa1, 0x80000000, 0x1, {0x0, 0x1, 0x5}, 0x28a10000, 0x6, 0x0, 0xffff, 0x18, '/dev/infiniband/rdma_cm\x00', 0x37, '[vboxnet1(proc\'$uservboxnet0vboxnet1+\',posix_acl_access', 0x9, 'mime_type', 0x16, '.%selinuxcpuset&*self}'}}, 0xa8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40440, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000100)=""/239, &(0x7f0000000200)=0xef) 14:52:05 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x2}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:05 executing program 5: r0 = accept4$rose(0xffffffffffffff9c, &(0x7f00000000c0)=@full={0xb, @remote, @default, 0x0, [@rose, @default, @bcast, @netrom, @remote, @default]}, &(0x7f0000000100)=0x40, 0x80000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x8000, 0x18, 0xe8b, 0xffffffff}) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x8a2, 0x4) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f00000001c0)=""/73) [ 1945.782372][T23307] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1945.852125][T23632] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:06 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x280) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r1, 0x3ff}, &(0x7f0000000140)=0x8) 14:52:06 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x4}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r2, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x10000, 0x0) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000000280)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 14:52:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r1, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @multicast1}, @ib={0x1b, 0x8, 0xdb4, {"88d9a497db2395d9bc0994b0e08d40e6"}, 0x1f, 0xfffffffffffffffb, 0x3ff}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = gettid() perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x4000000000000000, 0x400, 0x632b19c2, 0x7, 0x0, 0xffffffff80000001, 0xc4080, 0x2, 0x20, 0x3ff, 0x0, 0x5, 0xd6f, 0x9, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x0, 0x7, 0x7ff, 0x200, 0x35e, 0x9, 0xd9f8, 0x5, 0x8, 0x7, 0x9e, 0x7ff, 0x4, 0x40, 0xdb9, 0x4, 0x6, 0x1, 0x6a, 0xe0000000000000, 0x0, 0x11c0000000000000, 0x0, @perf_bp={&(0x7f0000000300), 0x7}, 0x1000, 0x2, 0x200, 0xa36470efb53c37c9, 0x867, 0x6, 0x3}, r4, 0x10, r2, 0x3) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0xffffffffffffff18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000600)=0x3f, &(0x7f0000000640)=0x4) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:06 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1946.315289][T23724] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1946.337809][T23724] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x16a, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0xfffffffffffffe17) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:06 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x5}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000100)) 14:52:06 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r5 = syz_open_procfs(r3, &(0x7f0000000240)='environ\x00') bind$nfc_llcp(r5, &(0x7f0000000280)={0x27, 0x1, 0x2, 0x7, 0x401, 0x12ca, "8e05372fa00bae5c822e33d803a71c7fce34df8698b9f69829a2547467a739fc1df26f77ac085638bbdba00d54b200952b31d3d569c7e19f002cff15323a0d", 0x10}, 0x60) setresgid(r1, r2, r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f0000000300)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r6, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) [ 1946.579696][T24140] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1946.613569][T24140] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) ioctl$TIOCSBRK(r2, 0x5427) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) setsockopt$inet_dccp_buf(r2, 0x21, 0xf, &(0x7f0000000300)="6dc9358c05d2c4597ff486d4b4338fb742add4", 0x13) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) connect$nfc_llcp(r2, &(0x7f0000000200)={0x27, 0x1, 0x0, 0x7, 0x100000000, 0x9, "8cd7e4c1c76f2ebdf7d58dacaa7e3bee402529a11981fc4c855f4008c484a7b65e5a0f98e3b32eb4ef6537786de93b5f256a183ea95edcfc0d1eb165310f93", 0x2e}, 0x60) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:07 executing program 4: mmap(&(0x7f0000634000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x501000, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000140), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240), 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:07 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:07 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = socket(0xa, 0x3, 0x2a) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000140)=0x7f, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f00000004c0)="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", 0x1000, 0xfffffffffffffffb) r5 = add_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f00000014c0)="90dda53eff6cd7a81719e231286a5ecc5fe6e43ceabf2c0e05a653588e60c9ecb93fb8f4d4c8b5bb5f673aacc90489e20eb3d9aa3266b6643ddf296d0cd5ad4f3eface7b0d", 0x45, 0xfffffffffffffffd) keyctl$reject(0x13, r4, 0x8d9, 0x89, r5) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000001540)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @ipv4}, {0xa, 0x4e20}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:07 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x8, @remote, 0x5ea8}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x1ff}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x6, @rand_addr="5dbc89e63bf436f8b61a78f92b9cc7b0", 0x8}, @in6={0xa, 0x4e24, 0x8f2, @loopback, 0x81}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}], 0xa0) keyctl$join(0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r1, r1}) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000002c0)=""/27) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000280)) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r2, 0x6, 0x18}, 0xc) [ 1947.192761][T24670] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1947.213941][T24670] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:07 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x1) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) 14:52:07 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x10}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x80000000002, 0x9}}, 0x1e) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0xfffffffffffffe21, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x10000, @rand_addr="4875e156264f54ef63420d1ed0262280", 0xffffffffffffffff}, r1, 0x4}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000300)={{0x102000000, 0x5}, 0x1, 0x3, 0x8, {0x8, 0x4}, 0x0, 0x2}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:07 executing program 2: chroot(&(0x7f0000000280)='./file0\x00') r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = dup2(r0, r0) write$P9_RWALK(r1, &(0x7f0000000100)={0x16, 0x6f, 0x2, {0x1, [{0x10, 0x2, 0x3}]}}, 0x16) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) [ 1947.382535][T25085] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1947.441237][T25085] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:07 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) signalfd(r1, &(0x7f0000000040)={0x1fb9}, 0x8) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:07 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x30}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x4, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r2, 0x10000}}, 0xfffffffffffffd5f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1947.672578][T25515] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1947.695265][T25515] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:08 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x78}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:08 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) r1 = syz_open_dev$video(&(0x7f0000000300)='/dev/video#\x00', 0x8, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e24, 0x80000001, @mcast1, 0x9}, {0xa, 0x4e21, 0xd0f, @local, 0x3}, 0x7, [0x5f, 0x20, 0x4, 0x100, 0x3329, 0x39, 0xfffffffffffffff7]}, 0x5c) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000100)={0x1d000, &(0x7f00000000c0), 0x1, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000000)={0x7, 0x483}) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) [ 1947.844914][T25824] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1947.916075][T25824] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:08 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={r1, 0x4}) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:08 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x80000, 0x60) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f0000000200)=""/100, 0x64, &(0x7f0000000300)=""/19, 0x2, 0x2}}, 0x68) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0xfffffe67, 0xfa00, @id_afonly={&(0x7f0000000340), r2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200), 0x106, 0x1003}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000003c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0xb4, 0xfa00, {0x0, 0x3, r1, 0x1c, 0x1, @in6={0xa, 0x4e21, 0x1a41, @loopback, 0xffff}}}, 0x7e) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) accept4$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x80800) 14:52:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:08 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) socketpair(0x13, 0xe, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x10000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) r3 = dup(r0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f00000000c0)={0x3, 0x10000, 0xfd00, [], 0x0}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000280)=0x1f, 0x4) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x2, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r3, 0xc028564e, &(0x7f0000000100)={0x0, 0x1, [0x6, 0x4, 0x3ff, 0x1ff, 0x3, 0xb3f6, 0x27ef, 0x9]}) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280), 0x0) 14:52:08 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x408}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1948.356420][T26146] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1948.405955][T26146] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4010000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0x344, r2, 0xc0a, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xcc2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x17}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}]}, @TIPC_NLA_MEDIA={0x100, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffb689}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}]}]}, 0x344}}, 0x20048010) 14:52:08 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x30, 0x1, 0x6a, "b09a9eeef807bc6578234c5c0f9805df", "f0cc1592c532322c3adbe3706f1a6e9d6a86bac59b4aeeaee4334d"}, 0x30, 0x2) 14:52:08 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x500}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0xf7a5, 0x440000) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000240), &(0x7f00000002c0)=0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x3, r3, 0x0, 0x0, 0x1}}, 0x1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:08 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xeafe9ca57bb16981, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffff7}, @in={0x2, 0x4e22, @multicast2}], 0x2c) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x7c101b5cc439904b, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000003780)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000052c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) r3 = socket$isdn_base(0x22, 0x3, 0x0) recvmmsg(r3, &(0x7f00000050c0)=[{{&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000400)=[{&(0x7f0000000480)=""/104, 0x68}], 0x1, &(0x7f0000000500)=""/202, 0xca}, 0xd6}, {{&(0x7f0000000600)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/50, 0x32}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/173, 0xad}], 0x3, &(0x7f0000000840)=""/120, 0x78}, 0xdef3}, {{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000000940)=""/199, 0xc7}, {&(0x7f0000000a40)=""/64, 0x40}, {&(0x7f0000000a80)=""/39, 0x27}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/153, 0x99}, {&(0x7f0000001b80)=""/4096, 0x1000}], 0x6}, 0x40}, {{&(0x7f0000002c00)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002c80)=""/129, 0x81}, {&(0x7f0000002d40)=""/100, 0x64}, {&(0x7f0000002dc0)=""/31, 0x1f}, {&(0x7f0000002e00)=""/42, 0x2a}, {&(0x7f0000002e40)=""/198, 0xc6}, {&(0x7f0000002f40)=""/2, 0x2}], 0x6, &(0x7f0000003000)=""/200, 0xc8}, 0x100000000}, {{&(0x7f0000003100)=@alg, 0x80, &(0x7f0000003280)=[{&(0x7f0000003180)=""/195, 0xc3}], 0x1, &(0x7f00000032c0)=""/241, 0xf1}, 0x4}, {{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f00000033c0)=""/244, 0xf4}, {&(0x7f00000034c0)=""/133, 0x85}], 0x2, &(0x7f00000035c0)=""/121, 0x79}, 0xb0}, {{&(0x7f0000003640)=@ax25={{0x3, @bcast}, [@netrom, @rose, @default, @rose, @remote, @default, @bcast, @bcast]}, 0x80, &(0x7f0000004ac0)=[{&(0x7f00000036c0)=""/19, 0x13}, {&(0x7f0000003700)=""/2, 0x2}, {&(0x7f0000003740)=""/40, 0x28}, {&(0x7f0000003780)}, {&(0x7f00000037c0)=""/89, 0x59}, {&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000004840)=""/234, 0xea}, {&(0x7f0000004940)=""/132, 0x84}, {&(0x7f0000004a00)=""/177, 0xb1}], 0x9, &(0x7f0000004b80)=""/211, 0xd3}, 0x4}, {{0x0, 0x0, &(0x7f0000004f80)=[{&(0x7f0000004c80)=""/216, 0xd8}, {&(0x7f0000004d80)=""/136, 0x88}, {&(0x7f0000004e40)=""/115, 0x73}, {&(0x7f0000004ec0)=""/31, 0x1f}, {&(0x7f0000004f00)=""/113, 0x71}], 0x5, &(0x7f0000005000)=""/187, 0xbb}, 0x1}], 0x8, 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x9, 0x200040) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000000c0)=0x40, 0x4) [ 1948.624762][T26622] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1948.663739][T26622] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:09 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x804}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:09 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f00000002c0)={0x0, 0xb1, 0x8, {0x0, 0x1c9c380}, 0x3, 0x80}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x37, 0x2, 0x8, "ee88a1ee465f8f587c8d3f0e55fd516d", "4f998f312008632fe865a39566312594e16ba5c7f05a9eefae0ad80ee0dad5d23387"}, 0x37, 0x3) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@ipv4_getroute={0x1c, 0x1a, 0x210, 0x70bd2b, 0x25dfdbfd, {0x2, 0x34, 0xb4, 0x0, 0xfd, 0x4, 0xff, 0x4, 0x400}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x804) 14:52:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) futex(&(0x7f0000000040)=0x4, 0x3, 0x4, 0x0, 0x0, 0xffffffffffffffff) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x6, 0x3, 0x8, 0x100000001, 0x1, 0x3]}, &(0x7f0000000100)=0x10) [ 1949.177937][T27098] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:09 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x3000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1949.234347][T27098] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:09 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 14:52:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000680)={0xffffffffffffffff}, 0x106}}, 0x29b) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000740)={0x5, 0x1ff, 0x2, 0x20, 0x800000000000000, 0x55, 0x8001, 0x18, 0x0}, &(0x7f0000000780)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000007c0)={r4, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x9}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000300)={r7, 0x3, 0x20}, 0xc) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000340)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000540)={{0x7, 0x5, 0x0, 0x80, '\x00', 0xfff}, 0x5, 0x8, 0xfffffffffffffff8, r8, 0x4, 0xfffffffffffffffa, 'syz0\x00', &(0x7f00000004c0)=['mime_type!\x00', '/dev/infiniband/rdma_cm\x00', 'GPLcgroup\x00', '/dev/infiniband/rdma_cm\x00'], 0x45, [], [0x3, 0x1, 0x1, 0x100000001]}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000380)={r7, 0xaff6}, &(0x7f00000006c0)=0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:09 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) getpeername$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) [ 1949.500507][T27625] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1949.537085][T27625] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:09 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x181910, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x800, 0x204000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1f, &(0x7f0000000080)='vmnet1securitytrusted-bdevppp0\x00', 0xffffffffffffffff}, 0x30) write$FUSE_LK(r0, &(0x7f0000000100)={0x28, 0x0, 0x2, {{0x2, 0x14, 0x2, r1}}}, 0x28) futex(&(0x7f000000cffc)=0x4, 0x800000000005, 0x0, 0x0, &(0x7f0000000240)=0x200000000, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_ifreq(r0, 0x893f, &(0x7f0000000000)={'bridge_slave_1\x00', @ifru_hwaddr=@broadcast}) futex(&(0x7f0000000140)=0x2, 0x81, 0x2, &(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)=0x2, 0x0) 14:52:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0xffffffffffffff36, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0xffffffffffffffff, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0x3aa) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@remote, @in=@initdev}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0x50, &(0x7f0000000380)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r2, 0x4) getuid() openat$rfkill(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@empty, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) 14:52:09 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x8, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000340)=0x80, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) write$P9_RRENAMEAT(r1, &(0x7f0000000180)={0x7, 0x4b, 0x2}, 0x7) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0xffffffffffffffff, 0x10008}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000000)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @broadcast}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f00000001c0)={0x7b4fff9d6b81aed6, 0x6, 0x2, 0xc8d1}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'rose0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:52:09 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x7800}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() r5 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r5, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) getresuid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r10 = geteuid() getgroups(0x8, &(0x7f0000000780)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="000000eaeb6faae1cd7f00f7eacd1d27b2fd65b782e0aea9e81a060998c2a91118e807dcd7f29c251da0985ec97339c7855ddcbbf1fb976f51242296f9e5000000", @ANYRES32=r9, @ANYBLOB="02000200", @ANYRES32=r10, @ANYBLOB="040004000000000008000200", @ANYRES32=r11, @ANYBLOB="08000600", @ANYRES32=r12, @ANYBLOB="10000100000000002000060000000000"], 0x6c, 0x2) 14:52:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1949.842421][T27953] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1949.858670][T27953] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffff00000000, 0x200) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) fsync(r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:10 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(0x0, 0x8001, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x0, @multicast1, 0x4e21, 0x0, 'ovf\x00', 0x1, 0x7f, 0x13}, 0x2c) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:10 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8008}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1950.049391][T28374] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1950.071903][T28374] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:10 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xff0f}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) r3 = accept4(r0, &(0x7f0000000200)=@alg, &(0x7f0000000140)=0x80, 0x80800) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)={'filter\x00', 0x7b, "ed0c3020eb557fb5f8b40aba3577e21c0ed24fb406aae8bb49815dc0e1ce2f3310e35fab40b993ed1e9e848b23c9b34470d342bd34e0a28ed4415c465639166cd583a1cbc573211426034e97efda5bb97289afa6e928da4a11115d96956467b1785eb86f08b624f982231bf69a43de185c657697709df35aff33dd"}, &(0x7f0000000300)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x480000, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000640)={0xb, 0x10, 0xfa00, {&(0x7f0000000580), r2, 0x1635}}, 0x18) 14:52:10 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000001100)={0x40, 0x16, &(0x7f0000000100)="d3d0d79beead1e71cebcb52829071a6726b4f5c79f2621806354309865ff0c5b1598bd88cfc1c70a5ddabb1911058c99fb287e1738f791fd90a22d08d795312d047ff2216239631b4ea89f5e2fae41cbd4d924ef3683a3866ede39f2973a50c05eac8ad3714762c7827b307c197404c1bc8949d968e43cabfdcf9d9abd2137a20e274a54f2ee3b5b518cc0dad1519756680e1ac94ecd95cf363b829b7ad7404073361be2990332ba7ce5e81349c5793826636675a636dec8d04f47741eb277b32862595100f439e91638aade44d6629288cc16e3af92c968dba5308a1cb2962671c87f5587b53363773285704481b489457eb6b91df9aac2b9d2c431e054477f31a7f6f24d7cdf0b8072a715ff61d62b37d189d8b2a754f0d88bdb48c56443768b4c5c69639e242905dda31f75b855ec79b398a7ebc564a93665f564d9e2867619cfc4c596d2b95654a1def5ae4c6146a0274a53e3c46f19f1d5b6b6ac8042308d694b0f35d376879c97a6cf79398b4c34f8cd68672d5b3916208a2e80545b1719898fdedf9bb47db07bc23e59e2dca6246a13fbfa166176db5446ae2f3662265705bc0b132bb363df4380cc74917e7080a17d162ad49783f12ca96be24c535849c9babb9f45926fc60f14fcfd444e27453d6a257f7fb8940eb945f4b14b44f0f9e50127c8ddad4668faeb30f7b23620187bce4a677a8565436891e2d140b8ef80bebea6749c9fa626522eeb7fe6e024229293d8f4e4aeb5cc9c0722b5ba2d199772caa33ad71f4d06ab44325c2addc42afaedf0ccc8b53c61e30491a084bbc9df0e5fd795199d1effaf40db8772dfe313b8cee414fbbeee783d63b55b42b8341778c3390102353ed5a7fddfbdc6e868e48230eb365654dadccd300bcf8595a1e4f2809c2a2e38b913d1399b330ded563f98a1c8d57199441fdd849ad48b10e025178c76345d31af1f7bb2755c700137ff7bf5f28fb6b1214118361806c451dd1c0b75ef5e8c9b19fe21a9c2e0e70e0fe293a322a0dbf0903f64aad11d34e65d4e8f915c14bbda0a21cf94174648a2acff14ae4ff45eace481ea96660737f3aa56335d674d9a35024b2c7bdaa74a79de52e63364dd53656ff66ec64c9df79a09867ce494cc2ecec5ee777a4cf9174cb6e6ae567a360340faf2363561e4f2504e8caa5075a6002c2d6ee7534912550d014895c87dd040db56f0c4e02130cef2118b0aaa1c60f3073f6120536216326eef06a05075e156f20ec9b0f0c344013d73b441ec948a5a8059b87feca5c425720e547d9a6b628ed86f1e0936127eb9830626035e379a8fc7ede6fed332e635d1b008706a703aa4772385d5315ef69ea18ea04b8b2ac6053e4db9e7e8af51921085d5e973dc1dbac6b13a89502a163bfe2799717182be5459a00b01a304b4fadb0bc8628b8c727631b65e677dc34da96ff9b2bb20c17ba8c18c2802b60af786a8734cd449873ce41d272ff4975e27fba2c2a70da1d3aa70c22c7f0b6ac491ec1edf46f1a2631485c2dc7e346c2c973d08469be7d51f57e44aa8f5de672c131b1368ca5af4b8f02c656f9500c9248acb448dbf063c3c1a6fe602a91eaf600710f314a31fe39e010fa9d4db6842081d444c0662d0448a4d00a3f9b90ee24ced21c5676ea232b85c3f97e13dbc108d297fee521db4542f85ffacd71e5ee5bd855e9d97bef5e87233597d402a4ab32f759f69e829cca96c7270e34ccb83b4ee25de078611d136c2811bdf1a1ae9f3b734e633f57756869d0a5573d9837324833704923ec03a3a47f35799797e8f9b778fc4db002254d8c0eaa425503111ddd9344ee06e75a7aeaf782cca03a55e1abdce4964c47ec1c3a814d7fe1c49d8b77845350b84564a2f41ae9a0001902add88f9774a6d6fd84db61eef90e4ac134bb2743aea075b4937ca7d03c8cc938b456f6407c5699c27c24153252eb09b10db716f03a99774f36b1a9080dfdc70706b4d58a21a799087b3b0cccfd5974b56b53b1f69fa33b4b84a7b8e8efb9630ee6fc73f3e705111be17d8b8896c05c8900623e2378037e8e531256f60569c9cff80158c776f29a2681148663b98de607dadc962e48e6f8979418ac2647fadfdbb46f9ef6251bcc8fd66c11c0174989a068fb8dca7f5887211c2e92ce3c491e3b986a33dbb0ab8411e72d5d6bb457f7752c282ac6174e3708dc4136461c7ab266370d378d6dd81b901d274b5b77a84eb8d0d6c4fdfce39aef29de062da8939a59902ceb4445da4f6c7cdee96083b0c03332e9182d48212d0fa64c02c50a6ef4c29d7995be4349dc27b0bb3723f90f0cf49963cf60c7a123ee6aefe26704d5ea5336f026c12c651a415c6158a52ac5ee8db35fc397782616b32ebc8358fac54ccb8824d7928af951b8ad7a25fd936f075971b83e352a63aac057707041ef8020592b590ee26c5403e24224c95566300bb4b6088267f8c1348850713580f0f7447a386ca0eaeebf140ce048e8a655e38bbe008341ab4c9bf5efbb6c200b4e3b155aa94b937cbf9123cc64147e9d8bbe3f0c8770c01db52c9ad2990a52f54fb70c92b813821164a9db019f9368447ad922eda5195b27f5cef52f0c3538f95d2956ede44425283d4468f3490a836d5b40dacca1d39d246821dde310ec0462f81ba9c9fabbe555ed5a567a8ba4e6452a0d80029030be83c52a944702b84df3d42354fea0664865ad1f9d3018ec3d6258d96365cacb43877961c9cd35775b08b543d88c5642e7483e4f139b8e90ab8c6745867176af787632f0bde535455a628a5ca7cba07808ba9bc43616e47ca2d33ce9412e104249398bd3933aa3fb2cc7433d4702798b92a40f91c9bfc35d4e22da75bcafcdea53308e2a0aa8b49921c85fc8e272ba847728a06db7e76d46e4b6dbaac425bce76f0b803e1f86eebb1a7407557e370de03847004f432bf72f6e0c8335bed76f5e41cb085d317f1a4bb9b03f5ab4e75d441f7043b25ecb8b1e054042d6c9cfd9621e9480c4758521ebc8bfa6697c6336d5af5ddffc43b5007e47b8baef90c5f21571fca4146322bbc1fb02cfec73b70fc7be2c5bd0caa16e5e13b5ac12ec25c56564454947fec71e2f09d5f5e3330392b60f9951c8de369c2ed7dec975870b756e703f796b4ec9e79165a5eb5c0813eb1c6dbbb00f286ea06c7943619751312f7fd8d05bbfa29106d6d3b7a9173c882e3703659e9614ff9bfc90578d31bafa524d230aca1644f86c46b648f8173134d4a57cee39dfd2a812da86b5376722643af8b9a19c4b2e1f67dd88d446fbf3ff8ecbd9cb5f941061bbb80070b4031a244f8058210834c7a3ad2cb06f03c7bfe7441039207a1c6a11b802e21fa3cb08b57a9eef6c0c49a20a37bb29438b6821730b6ceece35b490d9999079547dd57603d406e3548a7adeeccf6363976fb78248e97436d6968f1602b6241675dbf2ca18d06affb3eb510fd6e6a75760eef2f0c069fa9da199b24b47c1a18c5516d0bfd4d73fda67cb2fbbef12a081cfea734f71b75ab45d89cfd5da7eddd69fb36b5e9854a99022e654563b26ee605d76b685f1a777d585fff8efcb7d34393c911c8d074361ce8cd768635a66e70555ab65ce014d49955159edb1c38907c31d8e7e98b7d45d1bbfdee7c507fd7d3d1111ef32d2dc33a34565d262028c1ab0c5bd982a1431d7f555aef2ceb45ce87f53adfb1593afd23467b2d1e48af0eb5f9ad4b0778dd19750b75a74b51eaae9db41e8863db339e1c78fc9b4210f411c7204ee4f9dde5a6a787efc554b7f94a41480b9ec1c83e41c4df393dd96c61c2d7fe6cd2e9ef1972b3f3f33c7fe304e7fd445c090da275cefdb33764a1c8af4ebf79a37a8c2da32788f1e660f376d338a6132ce9333e6ba868dba541ee4bc5d6a693cbf8b49319739575871ece291ac69d0a67c27126e6002c5fc03a105c4893aa40c7052dc5b571bbd2ecdeeb00dfa870a3f1fc4202fbd430b1045b59eff894ec5dedb3261336fbd890ecc98a7a964feadae69869273c44208dbcf0756756476c09ea863205242b5140ef5086368e96fc269ecfa10484b354d93fbb3e25ab0fd400c8558f577d0c2dcfe7df7ca50d1a73447a215e55c235e758a972d2cd7f931af12a90afa68bbf39363daf7c398ecd9e0c8f0e23f1c9a2435d8031cc6f727a514c883c4105c143c3d46386b7133f2cc9c73ae7d15d301c05bb95b9de9b643308f7800d94644b64c5be77d184454461e2f7302591bce371146c4c2f6d8d0fdbcdedf18449717fdadeb082532fba42fc101d8f441c422a5ce0fede797ffa8b5b2efbc99464fe2c95fb6b14d0377ec6bd09b830f61234645f4bd46e1093671af76ec210fcf99076f97bac6400194b1900b1ea0421aa4289e240b02de927316773b8e5119c82ee71d5474ef2025328d63c4c437553e54d7da283b03f7e4d3e09d129c538679f163ba19c214fc6f1e5941c652fb62535a32c1662426ec3fcb535894c4c2c64acdc9a93f1e54726c251a453642c0f1ebddd6ac5f38f9363d0a5fa3adafae512af670e49f89d4cac1c123efa708c2b3a957c02e4893f0282ce6622f5257613425fae77a5287b63e00bc84a01e72680e4e9c80368dcc15abae279560b8131dc290377628bf90432a0e767d75023d98bb24c87b343b918ed5bc0917d1afa7cef793436b5de50d33b5d5c83e1899f8a04d736dacd294932cfb699e6cc8637ad33bc24b55ced513234618666a0c00b9aab443b6539ded421ee524bdf22bf947de3b8b5c4b51e58c8cffb1241f8057e20a882c268ef9e350789025f9cbb807d1349a2189bbe3875708f2b7f2ce67a741ac27a699aea6c52a17ca9b5e97a807952e2dd386c9e04a74f0cf83d9205206432e5968ce921ba20add6bd8d1998115d4fb24223e208bc06e3e019995e3cf76078c98717341a622338598bd2c82212fa39e1ba92138930b4711e7f27db819639a097729721e45ffed1ed35ae8b5c64f312b72f8b74873d9e1a70d7f37147f517113f001acd1aa6e87935fe105ae1299cab15cdb80dcb76181d9ea56f00be46e23564c0d66553bb9ae58d19f9c0b6e9812097993b823e92e8c00454fbdd48af7d67d3c578082770599d62a2ef95416eaefc1ff4b6ba3f178f56741d0d8edb32dc23c100fbe021961c36414ef69e9d260047b50c80effeeb0949d8c080255ac539ad0a5bd77dfb0a0de38023939a24543d8517bb0bdf946519b7a196f5cfea2b6b7d748d1fc24edfb5d439342aa506bd0675cf6785fdbf680913b029e56356e554d2a2988fa1858c6d45622d58a32f65bc98e0699d52d5b78473fe4a7067e48741b15e175ebe2aeb7322351b345c65cde26605444f31b5d54546f7b08753dec1900330740cf63a7bcc317d417cedab21f0fd24ef6729171343342651104f5452b6c8e6ab49bbf155b51a9f6d0b92f5e4bdf577c36f4e0b7b36fec698e243c29e10010580613fea1b54427be7cd52e9cae05a90d63cdb9321748b3e4909c7e564473aaf6b7c69fef9307db234af8aa8d6afcc9df636b1be716a58949ed2d7273db1051eebe74e19471ed8ff72a74dac91726c6a2e11336a4c3d4245078a335a2fefe9c9532144be6886070aed76178f7ea84e362951d5e0a7a785d04c7523aa84deaef891d0759cf47092160fc6a0e4d3f89e75bb344ddafbfcfc71e1593f1ea4807e134a0388bf2858011cb434eae75dda248e9784fcc2d13b801b72ae397cca00c7fc912e70ecd6831b0385c920643b104345545715b2405fac4b179fb8e40c9aba843b23828c3b4b9cbff91a", {0xe268, 0x2, 0xf7755b43, 0x8, 0x3f9, 0xffffffffffffffc0, 0xc, 0xd991}}) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) getrandom(&(0x7f0000001140)=""/164, 0xa4, 0x3) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000040)={0x0, 0x8, 0x7fffffff, 0x6}) 14:52:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000004c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0xe, 0x0, [0x5, 0x7, 0x7, 0x1, 0x7, 0xffffffff, 0x9, 0x5, 0x3ff, 0x2, 0x81, 0x4, 0x6, 0xf83, 0xffff, 0x400]}, {0x25, 0x0, [0x7, 0x91, 0x40, 0x1, 0x0, 0x0, 0x5, 0x7, 0x4414fe0, 0x6, 0x100000000, 0x6, 0x7, 0x400, 0x4, 0x4]}], r2, 0x1, 0x1, 0x90}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x2, {0x101, 0xbf12, "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", 0x23, 0x6, 0x8000, 0x8, 0x4, 0x9, 0x800, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x117, 0x100f}}, 0x20) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x8, 0x2, 0x1, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x4}}, 0x10) 14:52:10 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f00000000c0)=0x1, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfff, 0x40) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:10 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x11eff}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1950.724992][T28912] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:10 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x100000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1950.774903][T29200] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:11 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) fchdir(r1) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:11 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x80000) getsockopt$netlink(r0, 0x10e, 0xf, &(0x7f0000000100)=""/183, &(0x7f00000001c0)=0xb7) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:11 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x1000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1951.074636][T29646] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00007af000)=[{&(0x7f0000000100)="480000001500190820ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a01009164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0xa) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @bt={0x100000001, 0x1, 0x4cbc, 0x3ff, 0x10000, 0xfff, 0x1c, 0x6}}) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000240)={0x3, 0x1}) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:11 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x40040, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x2, 0x30, 0x7, 0x3}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x4}, 0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x10001, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 1951.123412][T29646] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:11 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x2000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:11 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:11 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "ae4ae73060feb9a300e9afe036e9be5f"}, 0x14) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f00000000c0)={0x3}) 14:52:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000020}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x368, r4, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x100, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2fa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1e800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcd9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x43c}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffff8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x61f5809e}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7aed}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xac}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc48}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8235}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0xb8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5f}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0x368}, 0x1, 0x0, 0x0, 0x8051}, 0x800) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:11 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x4000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) [ 1951.715983][T30289] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1951.729281][T30289] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:11 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) 14:52:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) arch_prctl$ARCH_GET_CPUID(0x1011) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x7, 0x4) 14:52:12 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x5000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1951.938731][T30607] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x389000, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000200)=0x3, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000100)={0x1, 0x0, [], {0x0, @bt={0x101, 0x60, 0x7bdcb4d872bf9002, 0x3, 0x7fffffff, 0xea, 0x8000, 0x80000001, 0x6, 0x1f, 0x7f, 0x1f, 0x0, 0x3, 0x1, 0x6}}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) [ 1952.002612][T30607] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:12 executing program 4: mmap(&(0x7f00000c9000/0x3000)=nil, 0x3000, 0x103b0e93b836670f, 0x40010, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) socketpair(0x0, 0x3, 0xeb, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0)={0x100000001}, 0x4) futex(&(0x7f000000cffc)=0x1, 0x800000000005, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='\x00', 0x1, 0x0) 14:52:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:12 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0xb965}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000004c0)={{0x4, 0xf004, 0xf, 0xfffffffffffff7fa, 0x401, 0x401, 0x4, 0x9, 0x7, 0xffffffff, 0xfffffffffffffffd, 0x8000}, {0x6001, 0x1000, 0x3, 0x2, 0xba, 0x2, 0x0, 0x20, 0x59, 0x4, 0x7fff, 0x3ff}, {0x0, 0xf000, 0xe, 0x2, 0x1, 0x1, 0xb4dd, 0x5, 0x1f, 0x8a1, 0x0, 0x59ca9bfb}, {0x0, 0xd000, 0x10, 0x324000000, 0xb0, 0x0, 0xfffffffffffffffd, 0x4, 0x6, 0x3, 0x2, 0x9}, {0xf000, 0xf000, 0xe, 0x1f, 0xa8, 0x1ff, 0x2, 0x3, 0x5, 0x3, 0x3, 0x2}, {0x2, 0x10000, 0xc, 0x401, 0x7, 0x100000000, 0xffff, 0xe60e, 0x8001, 0x40, 0x0, 0x4}, {0x103000, 0x10d000, 0x4, 0x7, 0x5, 0x100000001, 0x2, 0x8, 0x4, 0x3f, 0xfffffffffffffffb}, {0x5000, 0x4, 0xb, 0x7, 0x4, 0x5, 0x401, 0x40, 0xffffffffffffff01, 0x2, 0x81, 0x8}, {0x0, 0x4000}, {0x0, 0x100000}, 0xc0000001, 0x0, 0x0, 0x100, 0x3, 0x1, 0xf000, [0x1, 0x7, 0xff, 0x2]}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x400}, {r0, 0x829c}, {r0, 0x4}, {r0, 0x8000}, {r0, 0x40}, {r0, 0x40}, {r0, 0x4}, {r0, 0x1002}, {r0, 0x4004}], 0x9, &(0x7f0000000000)={0x77359400}, &(0x7f0000000180)={0x7ff}, 0x8) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) [ 1952.505669][T31141] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1952.522087][T31141] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:12 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x210080, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, 0x0) signalfd4(r0, &(0x7f0000000040), 0x8, 0x800) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x4001) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000240)={0x4000003f, 0x1000, 0x1f}) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f00000000c0)=0x400) 14:52:12 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8040000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:12 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001600)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000380)={0x0, 0x74, &(0x7f0000000300)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x6, @rand_addr="d55bbd988354833b1f4412459bf548fa", 0x3}, @in6={0xa, 0x4e24, 0x0, @mcast2, 0x7}, @in6={0xa, 0x4e21, 0xb8a8, @dev={0xfe, 0x80, [], 0x21}, 0x2}]}, &(0x7f00000014c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001500)={r3, @in6={{0xa, 0x4e22, 0x1, @ipv4={[], [], @remote}}}, 0x0, 0x5, 0x8001, 0x2, 0xd9}, &(0x7f00000015c0)=0x98) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000001640)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000001700)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000040}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x28, r4, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x4800}, 0x20008050) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='eql\x00'}) read(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) rt_sigprocmask(0x3, &(0x7f0000000040), 0x0, 0x8) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1952.640401][T31498] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) semget$private(0x0, 0x2, 0x100) [ 1952.713920][T31498] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r1}}, 0xffffffffffffff66) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = socket$inet(0x2, 0x1, 0x3) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000004c0)={0x400, {{0x2, 0x4e22, @broadcast}}}, 0x88) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) r4 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x1, 0x400) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000200)=0x17, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:13 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f0000000100), 0xc, 0x0, 0x0, &(0x7f00000000c0), 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2200, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000140)=0xfffffffffffffff7) 14:52:13 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/124, &(0x7f00000001c0)=0x7c) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:13 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8800000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:13 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x200400, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0xffffffffffffff67, 0xfa00, @id_tos={&(0x7f0000000200)=0x1, r3}}, 0x1cd) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000280)={0x80000000, 0xfffffffffffffff9}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000340)) [ 1953.376537][T32101] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff7c, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1953.442507][T32326] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:13 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x4fe2, 0x1, 0x9, 0x7, 0x0, 0x7, 0x0, 0x3, 0x2, 0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffe66, 0x8001, 0x7f, 0x7, 0x1ff, 0x39735d36, 0x3, 0x1, 0x100, 0x5, 0xe5, 0x10000, 0x20000000000000, 0xff, 0x81, 0x1508, 0x6b, 0x6, 0x7fffffff, 0x7, 0x0, 0x400, 0x2d9, 0x4, 0x0, 0x4, 0x2, @perf_config_ext={0x81}, 0x10000, 0x400, 0x1ff, 0xd, 0xffffffffffff0001, 0xfffffffffffffffd, 0x7}, r2, 0x0, r1, 0xa) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 14:52:13 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x10000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1953.680593][T32596] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:13 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000100)=""/122) [ 1953.735162][ T401] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:14 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x10000, 0x80000000, 0x40100000, 0x2, 0x0, 0x80000000, 0x1ff, 0x8000}, &(0x7f0000000080)={0xfffffffffffffffd, 0x3, 0x401, 0x9, 0x1, 0x5, 0xffff, 0x401}, &(0x7f00000000c0)={0x9, 0x81, 0xa, 0x2, 0x0, 0x4, 0x20, 0x100000000}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x8}) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0xffff, 0x800) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 14:52:14 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x30000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:14 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040)=0x5, 0x4) 14:52:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) r5 = geteuid() sendmsg$nl_generic(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x490, 0x24, 0x1, 0x70bd25, 0x25dfdbfb, {0x1c}, [@nested={0x16c, 0x1f, [@generic="11e4e006ea47754c7999898b747213493a7494f2566eac1db2116f81fb84e0d3be7073df19b7e1153a2e442c207634c557f5e4f3cfdc0ec3199ec1d9fb912a1746c03871051c6f138df12e988fbe5057f4d1a178f1411dbd70244c9cfd47e72b45f16e06b1ac35882f42081d3bd5d4e5ab51f85362ec232e452a4583c8cbadd1411ab60ffcfff156fc5a805096fe1b33660cd4a84191613dffc4e692bbc0403443816b8226e508e6b6e0923111cd3eddaadd0fb6888a2537ab125556c0f2f5317ae913126ea6676a9e626ba2d47343555d2e244ccdfb878d124b5776d2677b0aa8a8d13ebd37881aca18c4dcf9ccc4", @typed={0x8, 0x5b, @pid=r4}, @typed={0x8, 0x69, @ipv4=@local}, @typed={0x68, 0x57, @binary="b6ffa095c1c36b2daa82952b05a3d2b0c74fec7d351cf1ab94cac53a0265916160b6eafce45b039511fe114abb2a39c144fa82696cb45fc25e372da1fcea5ba8884c71b0f270bdcd7382e60aacb0fbf061c68154e37ab1c9895cbd10ad586cead57ac1f5"}]}, @nested={0x2c, 0x6a, [@typed={0x8, 0x35, @fd=r0}, @generic="272ea8f56b80b055cfdcb582484f9044f4f913c1d96f95", @typed={0x8, 0x24, @str=']\x00'}]}, @nested={0x2e4, 0xf, [@generic="0605041372f905e0560ff709d73dccfbd88aafd54ce4b481f9b4523e7dd2297dca3460a670697228e72e4cb23a03bfdebb1e1f2baf96da68f8ed0c87aa6ab58845b227922f91f6894f45662a54ef03eb5b765dfe79118b03d222c8b9e477c66320153b6feab9b1be318a450980ee73dd43de047d8224ad8ba310d46d2d81", @generic="8c4b2196a8261a67d53a4a9992371530640c8e99534c02e233273f86ddf046f0fd98ea497bfc324087cb217e40a2525e0de3336553fcad4d692f7b81203785a1b68ffb2432b32737ee422f3c7271ab9e2a4e2a17b8534a66a9071dd760a0ae11da933d47fd75454098a7841695720502f72c0534d3225ab4e5f5c09e9d6a063fbb805a3a296f2ea26642de07a77cd36a2934493db77dceac03e038248d4dc8fbcae0ac2fcc344a7f14e7b94a517a6b0f2b72606b57fb2ee927638f33a585e6c3c404d60b42c8eb3537cab764ba21", @typed={0x8, 0x4f, @uid=r5}, @generic="92c3e0fb61e4b35f77167725e708c4945fa8a24dbb422f8325ad94edb1522d3014ccf9cf964701a65868bc51f3f67ca5c635437983f3f3466e7cb429c2573fd3081163ac51b7a96c10fc9e87bac341a74590935aadb5a9a6b5d5b3d1c451f069a14b8b195057ff907813a332e11282983c", @generic="5728c8c4264939fd5a7634b6a52093bade767ab182944b0407330928fb838b86ae04cbe9c727a353351185d3cb834b1080e69dabb671f6a3180b883f8000b06ee142ea29ab7aadcf5de469985e7ba22ac38c8dfcbe821b0867cc82b849ab20b089e54f7c990f58dbb35e1254daa43af9e5c8c4f9", @typed={0x8, 0x3, @ipv4=@loopback}, @generic="27fe0e5b4869ed79dfd5392743177d5dcdaa653ec6734d4d1ee064dbfc42992de01565ac13", @typed={0x8, 0x74, @u32=0x6}, @generic="60cef17130e84f34f7a96670aff99364ef67bba97fc158eec7720a797c428bd5a70919c5429b496510ddbddcbb7c8ed9b683ff812762bc80007d135f73db30fade33c0372e3448a6c80d3dfde2a3a14d81d1b322e4512487ad481c7d422f9a6093d290918b641bb2af2d0d2b785de4a9d3d1"]}]}, 0x490}}, 0x1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:14 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, 0x0) 14:52:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:14 executing program 2: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e3646442c0f3ffc442019dccd3196f") symlink(&(0x7f00000001c0)='./file2\x00', &(0x7f00000002c0)='./file2\x00') clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000a00)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file2\x00', 0x0, 0x0) io_setup(0x200, &(0x7f0000000280)=0x0) io_destroy(r2) [ 1954.381293][ T582] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1954.399133][ T582] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:14 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x78000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback, 0xfffffffffffffffc}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x8000, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0x100) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x401, 0xb0082) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) 14:52:14 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'bcso0\x00\x10\x00\x05\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x40011) [ 1954.679705][ T908] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:14 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8bffffff}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1954.736433][ T908] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:15 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000300)={r2, 0x1, 0x6, @broadcast}, 0x10) r3 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setresgid(r1, r3, r4) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 14:52:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:15 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4000fff, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:15 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xa1ffffff}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1955.238511][ T1452] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1955.262367][ T1452] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x5, 0x100) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:15 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000a00)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file2\x00', 0x0, 0x0) io_setup(0x200, &(0x7f0000000280)=0x0) io_destroy(r2) 14:52:15 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) accept$ax25(r1, &(0x7f0000000100)={{0x3, @netrom}, [@default, @bcast, @null, @default, @default, @bcast, @netrom, @default]}, &(0x7f0000000180)=0x48) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$BLKRAGET(r2, 0x1263, &(0x7f00000001c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="30010000", @ANYRES16=r3, @ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x20000804}, 0x84) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000040)) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 14:52:15 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xe4ffffff}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1955.508417][ T1897] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1955.554111][ T1918] vivid-003: ================= START STATUS ================= [ 1955.563739][ T1918] vivid-003: Test Pattern: 75% Colorbar [ 1955.590642][ T1918] vivid-003: Fill Percentage of Frame: 100 14:52:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x7fff, 0x601, 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1955.592771][ T1897] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1955.638052][ T1918] vivid-003: Horizontal Movement: No Movement [ 1955.668960][ T1918] vivid-003: Vertical Movement: No Movement [ 1955.695706][ T1918] vivid-003: OSD Text Mode: All [ 1955.723113][ T1918] vivid-003: Show Border: false [ 1955.746568][ T1918] vivid-003: Show Square: false [ 1955.751990][ T1918] vivid-003: Sensor Flipped Horizontally: false [ 1955.760147][ T1918] vivid-003: Sensor Flipped Vertically: false [ 1955.792034][ T1918] vivid-003: Insert SAV Code in Image: false [ 1955.800461][ T1596] Unknown ioctl 44547 [ 1955.815605][ T1918] vivid-003: Insert EAV Code in Image: false [ 1955.861099][ T1918] vivid-003: Reduced Framerate: false [ 1955.871652][ T1918] vivid-003: Enable Capture Cropping: true [ 1955.885659][ T1918] vivid-003: Enable Capture Composing: true [ 1955.891900][ T1918] vivid-003: Enable Capture Scaler: true [ 1955.899126][ T1918] vivid-003: Timestamp Source: End of Frame [ 1955.905957][ T1918] vivid-003: Colorspace: sRGB [ 1955.911267][ T1918] vivid-003: Transfer Function: Default [ 1955.920347][ T1918] vivid-003: Y'CbCr Encoding: Default [ 1955.930303][ T1918] vivid-003: HSV Encoding: Hue 0-179 [ 1955.938524][ T1918] vivid-003: Quantization: Default [ 1955.949211][ T1918] vivid-003: Apply Alpha To Red Only: false [ 1955.958075][ T1918] vivid-003: Standard Aspect Ratio: 4x3 [ 1955.967831][ T1918] vivid-003: DV Timings Signal Mode: Current DV Timings [ 1955.977220][ T1918] vivid-003: DV Timings: 640x480p59 inactive [ 1955.987834][ T1918] vivid-003: DV Timings Aspect Ratio: Source Width x Height [ 1955.998466][ T1918] vivid-003: Maximum EDID Blocks: 2 [ 1956.009807][ T1918] vivid-003: Limited RGB Range (16-235): false [ 1956.018435][ T1918] vivid-003: Rx RGB Quantization Range: Automatic [ 1956.029220][ T1918] tpg source WxH: 320x180 (Y'CbCr) [ 1956.037161][ T1918] tpg field: 1 [ 1956.037785][ T2312] Unknown ioctl 44547 [ 1956.040856][ T1918] tpg crop: 320x180@0x0 [ 1956.052798][ T1918] tpg compose: 320x180@0x0 14:52:16 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0xdc3, 0x9}, {0x1ff, 0x7}, 0x4, 0x3, 0x7}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x4, 0x0, 0x0, &(0x7f0000000040)=0x1000, 0x0) 14:52:16 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xf4ffffff}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1956.059469][ T1918] tpg colorspace: 8 [ 1956.067161][ T1918] tpg transfer function: 0/2 [ 1956.072010][ T1918] tpg Y'CbCr encoding: 0/1 [ 1956.078582][ T1918] tpg quantization: 0/2 [ 1956.082981][ T1918] tpg RGB range: 0/2 [ 1956.092716][ T1918] vivid-003: ================== END STATUS ================== 14:52:16 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x8, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000340)=0x80, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) write$P9_RRENAMEAT(r1, &(0x7f0000000180)={0x7, 0x4b, 0x2}, 0x7) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0xffffffffffffffff, 0x10008}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000000)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @broadcast}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f00000001c0)={0x7b4fff9d6b81aed6, 0x6, 0x2, 0xc8d1}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'rose0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r3, 0x1, 0x6, @broadcast}, 0x10) 14:52:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) signalfd4(r0, &(0x7f0000000580)={0x54}, 0x8, 0x800) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x101200, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0xffffffffffffffe7, 0xfa00, {{0xa, 0x2000000004e21, 0x5feb, @dev={0xfe, 0x80, [], 0x1d}, 0x1}, {0xa, 0x0, 0x81, @empty}, r1, 0x3}}, 0xfffffffffffffe98) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x140, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000540)=0x5) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100000001, 0x2000) setsockopt$nfc_llcp_NFC_LLCP_RW(r4, 0x118, 0x0, &(0x7f0000000140)=0x1, 0x4) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0xfffffffffffffda6, 0xfa00, {r2}}, 0x10) r5 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7, 0x82) setsockopt$inet6_dccp_int(r5, 0x21, 0x1b, &(0x7f0000000300)=0x100000000, 0x4) 14:52:16 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x20, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) socket$nl_netfilter(0x10, 0x3, 0xc) [ 1956.195351][ T2364] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() r5 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r5, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) getresuid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r10 = geteuid() getgroups(0x8, &(0x7f0000000780)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="000000eaeb6faae1cd7f00f7eacd1d27b2fd65b782e0aea9e81a060998c2a91118e807dcd7f29c251da0985ec97339c7855ddcbbf1fb976f51242296f9e5000000", @ANYRES32=r9, @ANYBLOB="02000200", @ANYRES32=r10, @ANYBLOB="040004000000000008000200", @ANYRES32=r11, @ANYBLOB="08000600", @ANYRES32=r12, @ANYBLOB="10000100000000002000060000000000"], 0x6c, 0x2) [ 1956.248099][ T2364] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:16 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xfeffffff}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x4e23, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x1, 0x82400) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000200)={[{0x4, 0x10001, 0x2, 0x400, 0x356, 0x1ff, 0x5, 0x2, 0xffffffffffffffe1, 0xd0, 0x1, 0x2, 0x9}, {0x3, 0xe798, 0x401, 0x8, 0x5, 0x238, 0x84, 0x0, 0x3, 0x7, 0x0, 0x2, 0x4}, {0x86, 0x1, 0x6, 0x82, 0xf7, 0x8e0, 0x0, 0x5, 0x6, 0x0, 0x0, 0x100000001, 0x9}], 0x51}) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x0) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000004c0)={0x8, 0x0, [{0x8, 0x1, 0x0, 0x0, @msi={0x800, 0x0, 0x80000000}}, {0x10001, 0x2, 0x0, 0x0, @sint={0x20, 0x2}}, {0x4, 0x0, 0x0, 0x0, @msi={0x3, 0x100000001, 0x5}}, {0x4, 0x4, 0x0, 0x0, @adapter={0x0, 0x999, 0x9, 0x1f, 0x7433}}, {0x3, 0x2, 0x0, 0x0, @adapter={0x7a, 0x400, 0x7, 0x9, 0x100000000}}, {0x2, 0x3, 0x0, 0x0, @adapter={0x800, 0x9309, 0x8001, 0x401, 0x5}}, {0x1, 0x3, 0x0, 0x0, @sint={0x20, 0x2}}, {0x7ff, 0x39002f52369dea5e, 0x0, 0x0, @adapter={0x0, 0x8001, 0x8, 0x5, 0x3ff}}]}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() r5 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r5, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) getresuid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r10 = geteuid() getgroups(0x8, &(0x7f0000000780)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="000000eaeb6faae1cd7f00f7eacd1d27b2fd65b782e0aea9e81a060998c2a91118e807dcd7f29c251da0985ec97339c7855ddcbbf1fb976f51242296f9e5000000", @ANYRES32=r9, @ANYBLOB="02000200", @ANYRES32=r10, @ANYBLOB="040004000000000008000200", @ANYRES32=r11, @ANYBLOB="08000600", @ANYRES32=r12, @ANYBLOB="10000100000000002000060000000000"], 0x6c, 0x2) 14:52:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:16 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) getrusage(0x1, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) r5 = getgid() fstat(r2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x5}, [{0x2, 0x3, r3}], {0x4, 0x1}, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x5, r6}, {0x8, 0x5, r7}, {0x8, 0x4, r8}, {0x8, 0x7, r9}], {0x10, 0x3}, {0x20, 0x4}}, 0x5c, 0x3) r10 = shmget$private(0x0, 0x3000, 0x54000004, &(0x7f0000ffd000/0x3000)=nil) getresuid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r12 = getgid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000380)=0x0) r16 = getpgrp(0x0) shmctl$IPC_SET(r10, 0x1, &(0x7f00000003c0)={{0x5, r11, r12, r13, r14, 0xc, 0x8}, 0x80, 0x80000000, 0x7, 0x400, r15, r16, 0x4}) [ 1956.524474][ T2769] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1956.576567][ T2888] kernel msg: ebtables bug: please report to author: Wrong len argument 14:52:17 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfb, 0x40004020}, 0xc) 14:52:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() r5 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r5, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) getresuid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r10 = geteuid() getgroups(0x8, &(0x7f0000000780)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="000000eaeb6faae1cd7f00f7eacd1d27b2fd65b782e0aea9e81a060998c2a91118e807dcd7f29c251da0985ec97339c7855ddcbbf1fb976f51242296f9e5000000", @ANYRES32=r9, @ANYBLOB="02000200", @ANYRES32=r10, @ANYBLOB="040004000000000008000200", @ANYRES32=r11, @ANYBLOB="08000600", @ANYRES32=r12, @ANYBLOB="10000100000000002000060000000000"], 0x6c, 0x2) 14:52:17 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xff0f0000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$sock_proto_private(r3, 0x89ee, &(0x7f00000005c0)="3c37b94f8e3af8f5ee1b306e59f0eeb6a1c08c4068ae2ca7137786e00e0ad1163b5f64c9aa1626b05514038ce5f2c96bcaed0cc6391f64493e7a1f093790d7f547758d1b8b836a10e50c41ddc6644e7b40b36ede15312f5847d91a27b54c4e7d297be200cb9c640f4c4190d38d2bb7c164a19d7038f3cd55f1d756965e8384f365518cb44e346bbf864c511cee020bc774a239a1b174e4faad396b71deac8d0a54b9e874815cb98b1b720b3a0a27235d1d97db36b5a766dec5fb7f81d7ce9af1d1db269cf5d2c9561e55e556aac5") sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x78, r4, 0x122, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x80) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000540)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0xfffffffffffffcb8) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:17 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000040)={0x0, 0xc000c, "b67d9375360157b461eeeb2e417134d3b3199820e51b7981", {0x6, 0x8}, 0x5}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) geteuid() getgroups(0x8, &(0x7f0000000780)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) [ 1957.259264][ T3123] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1957.280670][ T3123] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:17 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000040)={0x2, 0x1, [0x200, 0x2, 0x7, 0x5, 0x0, 0x1, 0x7, 0x1b]}) 14:52:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x1, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x1a0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:17 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xff1e0100}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) geteuid() getgroups(0x8, &(0x7f0000000780)=[0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01]) [ 1957.538330][ T3511] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1957.595216][ T3511] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:18 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1, 0x4a4c00) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000080)=0x7) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x8f, 0x3, 0x0, &(0x7f0000000040)=0x1, 0x0) 14:52:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.SMACK64EXEC\x00', &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x18, 0x3) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) getrusage(0x1, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) r5 = getgid() fstat(r2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x5}, [{0x2, 0x3, r3}], {0x4, 0x1}, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x5, r6}, {0x8, 0x5, r7}, {0x8, 0x4, r8}, {0x8, 0x7, r9}], {0x10, 0x3}, {0x20, 0x4}}, 0x5c, 0x3) r10 = shmget$private(0x0, 0x3000, 0x54000004, &(0x7f0000ffd000/0x3000)=nil) getresuid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r12 = getgid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000380)=0x0) r16 = getpgrp(0x0) shmctl$IPC_SET(r10, 0x1, &(0x7f00000003c0)={{0x5, r11, r12, r13, r14, 0xc, 0x8}, 0x80, 0x80000000, 0x7, 0x400, r15, r16, 0x4}) 14:52:18 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xffffff7f}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) geteuid() 14:52:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1958.072907][ T3815] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) 14:52:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x20, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) socket$nl_netfilter(0x10, 0x3, 0xc) [ 1958.114070][ T3815] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:18 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xffffff8b}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r5 = syz_open_procfs(r3, &(0x7f0000000240)='environ\x00') bind$nfc_llcp(r5, &(0x7f0000000280)={0x27, 0x1, 0x2, 0x7, 0x401, 0x12ca, "8e05372fa00bae5c822e33d803a71c7fce34df8698b9f69829a2547467a739fc1df26f77ac085638bbdba00d54b200952b31d3d569c7e19f002cff15323a0d", 0x10}, 0x60) setresgid(r1, r2, r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f0000000300)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r6, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) [ 1958.383754][ T4038] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1958.448037][ T4038] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:19 executing program 4: prctl$PR_SET_TSC(0x1a, 0x0) mmap(&(0x7f00007c5000/0x1000)=nil, 0x1000, 0x103b0e93b836670f, 0x8030, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) 14:52:19 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xffffffa1}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r3, 0x3, 0x1, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) [ 1959.138528][ T4275] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1959.177038][ T4275] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:19 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xffffffe4}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:19 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000000c0)={0x6, 0x0, 0xb414}) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000080)=0x3) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) futex(&(0x7f0000000100)=0x2, 0x8c, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180)=0x2, 0x0) 14:52:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in=@empty}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1b8, @ipv4, 0x3}, {0xa, 0x4e21, 0x0, @remote}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)) 14:52:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:19 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xfffffff4}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) getresuid(&(0x7f0000000340), &(0x7f00000005c0), &(0x7f0000000600)=0x0) quotactl(0x55930d0c, &(0x7f0000000300)='./file0\x00', r3, &(0x7f0000000640)="f2d7d847a7f5529a5653ac9278e4d423f6de425240a9e2677e5e7dacbc2f3b76cde3e8d28a34ba6ce64f287d2a86c9b912dea43f2db37d5ff825519ca6a54ac99854d0") r4 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x210040) ioctl(r0, 0x10000, &(0x7f00000004c0)="bb91572c10a1153a3125021bb64ad619115f0997551269fb324fcb427642bf0a49e9790a45702a3ac50d7cafcfe5e81cbda7c8fea22010f0cf6cdb1a3d91f1dfa5f17626487b63a13630514820bd87880391ace338a813c4d79266c20e619327e4d57bc696e46eda408cbf79ca01ac7de0d7493ad2e682e35a2221b16df7fcb6b1b7defb5fb146c8e127a2fdedf3df8b23b0b5cfdc35514a0ad03a956861df0941149e1430e4f5b7b7d7dccc18edf116260d5573e7677aa44510d1d98326ba0d4648223e572082fdf4b45ef52761ef7ba61f44dfede1b2c53868b2302beefa09300cb5baec3ecbd390036906") r5 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x2, 0x40) ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f0000000240)={r5, 0x5}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') write$P9_RRENAME(r3, &(0x7f0000000880)={0x7, 0x15, 0x1}, 0x7) [ 1959.690155][ T4711] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1959.724696][ T4711] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') 14:52:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x3ea, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:20 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xfffffffe}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:20 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) futex(&(0x7f0000000000)=0x1, 0x83, 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x2) 14:52:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() syz_open_procfs(0x0, &(0x7f0000000840)='net/ipv6_route\x00') 14:52:20 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xffffffff000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0xa00) write$UHID_CREATE(r1, &(0x7f00000005c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000004c0)=""/212, 0xd4, 0xfffffffffffffffc, 0xff, 0x0, 0x7, 0x5}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x3f4, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13e, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x72, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r2, 0x0, 0x1, 0x4}}, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000700)='/dev/snapshot\x00', 0x8000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000300)=""/86, &(0x7f0000000440)=0x56) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1960.360748][ T5256] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) getuid() [ 1960.419280][ T5256] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:20 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x800800000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) semget$private(0x0, 0x0, 0x400) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1960.706871][ T5483] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1960.759088][ T5574] kernel msg: ebtables bug: please report to author: entries_size too small 14:52:21 executing program 4: r0 = semget$private(0x0, 0x1, 0x0) semctl$GETNCNT(r0, 0x4, 0xe, &(0x7f0000000000)=""/57) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x671c, 0x200) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240), &(0x7f0000000280)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) fstat(r0, &(0x7f0000000300)) 14:52:21 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x10000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000004c0)=""/150) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x887ff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0xab, "19c311e4d3de089bdd0267c2553997c020242c530ae9e0e9775813db4dfa75dd8a9311201cd868b99e935891ee9125436ace64dcdb1923ec1d4546fd00371d57b86dcbd204bd38c57e7e2d69867c3cbafaf8be5382211ba95b5c6ca5f70fe5afdb48173342a6496445f3c5f2bc3fdb83bdba41af006f871a06c844571767801759517829873ae22e226ad74f43b48ca41bb3d2681d88d8d363dd7cbdfd8b45fa062335b36642fd2ef1fc55"}, &(0x7f0000000240)=0xb3) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x5) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000280)={r2, 0x7ff, 0x30, 0x80, 0xffff}, &(0x7f00000002c0)=0x18) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000100)) 14:52:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) fcntl$notify(r0, 0x402, 0x0) 14:52:21 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000080) socket(0x9, 0x6, 0x7fff) [ 1961.155129][ T5705] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1961.223525][ T5705] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:21 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xf0ffffff0f0000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 14:52:21 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x400000) 14:52:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:21 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x100000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) [ 1961.861005][ T5958] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1961.913585][ T5996] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 14:52:22 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x200000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1962.172843][ T6108] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1962.221551][ T6108] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:22 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x400000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r4}}, 0x48) 14:52:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:22 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x40, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000100)={0x1f, 0x4, 0xffffffff, 0x81}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) dup3(r2, r1, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) 14:52:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) [ 1962.664500][ T6242] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1962.702490][ T6242] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:23 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x500000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1962.931363][ T6492] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1962.956514][ T6492] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1963.214752][ T6646] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1963.249272][ T6646] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:23 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000100)={0x27fd, 0x0, &(0x7f000023c000/0x1000)=nil}) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000180)={0x17, 0x14, &(0x7f0000000140)="bce8e3e0dee7a14fab3e357130062b4391e809af"}) futex(&(0x7f0000000080), 0x800000000005, 0x3, 0x0, &(0x7f00000000c0), 0x0) 14:52:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:23 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x800000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) socket$inet(0x2, 0x2, 0x0) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x1d6, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:24 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r0}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1963.886376][ T6668] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1963.970575][ T6668] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:24 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r0}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:24 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x804000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:25 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x38101) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0xc7, 0x2, 'client0\x00', 0x1, "72ef3ce656ceb884", "002236bb1e6c948958a3b4238ddf43b91b35750547051521bc7fc9fe96d7d015", 0x9, 0x4}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x19) write$P9_RSETATTR(r1, &(0x7f0000000080)={0x7, 0x1b, 0x2}, 0x7) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x3}, 0x8) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:25 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r0}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:25 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x1000000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x4a6, 0x3, 0x100000000, 0x5, 0x8, 0x8, 0xffffffff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0xd38c, 0x3b1800000000, 0x4, 0x7, 0xfb0d}}, &(0x7f0000000200)=0xb0) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1964.906874][ T6912] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1964.925397][ T6912] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:25 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x3000000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:25 executing program 4: accept4$rose(0xffffffffffffff9c, &(0x7f0000000000)=@full={0xb, @dev, @netrom, 0x0, [@null, @rose, @rose, @null, @remote, @netrom]}, &(0x7f0000000080)=0x40, 0x0) r0 = epoll_create(0x1000009) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1965.196913][ T7041] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1965.255242][ T7041] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:25 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x7800000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) sendfile(r0, r0, 0x0, 0x9) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1965.521514][ T7168] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1965.605680][ T7238] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:26 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x4, 0x5, 0x66e43c5b, 0xff, 0x3, 0x3, 0x3, 0x154, 0x38, 0x2d1, 0x707e1eac, 0xfffffffffffffffe, 0x20, 0x1, 0x7fff, 0x9, 0x1}, [{0x4, 0x80000001, 0x0, 0x4, 0x10000, 0x6, 0x7, 0x2de}, {0x3, 0x30bd, 0x9, 0xffff, 0x1, 0x34, 0x0, 0x2}], "0a3a99c25fb98f31973c634b79dbf3cf70311358f0a75ade12dc1c914e04d374f920ef226afaae67022941e360474ad62b3ca8f99dbee3905bc9df4dc8cd0ea11e85cd00e79c084da14206950b32566d38fa308a12afa0f5c7d7962d57228d632603ed5bc9ef737656cfd5b5465ddf2bf159afccfda838ce09d0ee2ac2f548c11c221d435c1116eb8f4469fe944d8153b387f0028bd697e0e6371f0b0b9d5cd20107453e2601fc1a0fa64837ef8d96ea5bc0438b19968f234eaf29", [[], [], [], [], [], []]}, 0x733) r1 = syz_open_dev$usbmon(&(0x7f00000007c0)='/dev/usbmon#\x00', 0x5b4171c4, 0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x1200}, 0xc, &(0x7f0000000a00)={&(0x7f0000000880)={0x154, r2, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x568}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff969}]}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) 14:52:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:26 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8000000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1966.086867][ T7303] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:26 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x8bffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1966.317424][ T7522] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1966.401785][ T7522] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:26 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x200100) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000080)=""/81) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x4456, 0x8001}) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r1 = getpgid(0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x4000, 0x100) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioprio_get$pid(0x3, r1) 14:52:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:26 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xa1ffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:27 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1966.888697][ T7661] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1966.982259][ T7696] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:27 executing program 3: syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:27 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xe4ffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:27 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:27 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xf4ffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:27 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 14:52:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1967.578325][ T7937] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:27 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1967.621555][ T7937] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:27 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r0, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:28 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1967.781017][ T8135] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:28 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xfeffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1967.846566][ T8135] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:28 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000080)={0x2b2b9389, 0x1c, [0x3f, 0x6, 0x9, 0x6, 0x8000, 0x180, 0x1]}) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:28 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r0, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:28 executing program 3: syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:28 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xff0f000000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:28 executing program 3: syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:28 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r0, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1968.411231][ T8293] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1968.475264][ T8293] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:28 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xff1e010000000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1968.736402][ T8525] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1968.833936][ T8525] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:29 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000)=0x1, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x2000000000003) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:29 executing program 3: syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 14:52:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:29 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xffffff7f00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1969.189153][ T8642] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:29 executing program 3: syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 14:52:29 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0xffffffff00000000}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1969.532265][ T8792] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1969.558681][ T8792] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:30 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:30 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x2}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1969.899923][ T8895] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1969.968844][ T8895] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:30 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x4}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) 14:52:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:30 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x5}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:30 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10, 0x80800) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000000c0)="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", 0xfb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f00000001c0)=0x4, 0x8000000000000000, 0x0, 0x0, 0x0, 0x1) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 14:52:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1970.676868][ T9250] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1970.710150][ T9250] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:31 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) [ 1971.032594][ T9377] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:31 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x10}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1971.099889][ T9377] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x6a}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:31 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x12, 0x80000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, r0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3, 0x2080) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000100)) r2 = dup(0xffffffffffffffff) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000080)) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) clock_getres(0x7, &(0x7f0000000000)) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:31 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x30}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x4}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1971.615827][ T9627] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1971.663053][ T9666] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:31 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x78}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) [ 1971.878425][ T9771] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@short={0xb, @remote, @netrom, 0x1, @rose}, &(0x7f0000000080)=0x1c, 0x80800) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) mmap(&(0x7f0000a18000/0x1000)=nil, 0x1000, 0xfffffffffffffffd, 0x1000010, r0, 0xfffffffffffffffe) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000100)={{0x4, 0x100000001}, {0x9, 0x100}, 0xc34, 0x1, 0x4}) futex(&(0x7f000000cffc), 0x4800000000001, 0x2, 0x0, &(0x7f0000000040), 0x80000) 14:52:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:32 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x408}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1972.376692][ T9977] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1972.445440][ T9977] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:32 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x500}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1972.673752][T10117] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1972.711537][T10117] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:33 executing program 4: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0xfffffffffffffffd, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') fcntl$notify(r0, 0x402, 0x20) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x62c0, 0x0) 14:52:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 14:52:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:33 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0, 0x7fffffff}}, 0x48) 14:52:33 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x804}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:33 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0, 0x7fffffff}}, 0x48) [ 1973.347010][T10229] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1973.387972][T10229] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:33 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x3000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:33 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0, 0x7fffffff}}, 0x48) 14:52:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:33 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x250200, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xffffff9a) sendmsg$nl_generic(r0, &(0x7f0000001600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8800020}, 0xc, &(0x7f0000001640)={&(0x7f0000001680)={0x1484, 0x20, 0x100, 0x70bd27, 0x25dfdbfb, {0x14}, [@nested={0x210, 0x74, [@generic="6c09e00fa7e5b3eb9baeecbc057d5f752562c28d90ad05b12becf4b64c36eb211564ac223c024fd86392c3654e999f6fe426741d5940e764b9a452098d232859e4d3e2319e37db80a01c3db0eef7189651c48fa5205ea0ec7e274e71afce73fce0a1f3373e004028175b632369f2a1c3d336af4d121d99c304edaefdb5b88a956cdae1dc003b02f7d7a1b799f3e59f866b4c83e2dfd5181207bd6b493a0f2dfe86b50629808048e77f57ba5f92ad25300ee6", @generic="2dfa0a160313bce83c03c59f3cf2ba300c3dc1501168c9f1511265c2ab8aa042317c9c0ba95ec743dbdd24814db6922de457ced3dc3d824a7504df05f528641e8626ab081b66caa0764e699341d0be3a91a9c9677bfe8879885cfbcb44d062694360315f8d575fc206d142145bf7a6a6b48533152edd047fe90ab2ca43cf5655bf54f90bba66c93b5d8353d1018f03a2101b42d7dd5f75b3b585", @generic="c3394aa4c0b876677ea949a70cecefb473c281b6380452804bf669fba9c22ac04cc983ed6c8c2411ad7e5881df44533179844ecc0a31c659898f2a724c03b58d63bdb3cbcfab89d3517088ca84115e9f380325ff089dda63aa4cd80170d2a19933a0795eb5e5b662773e41bf03e3f8b0bbd2857f047d26d33d393877ef77e1d0bf8528469aa3224ebc92598b702947218be7962c5d422f7bf4eeff23dc158a2ceb17e131bfd7655cef8c895491b6dc5081156556089c240b516209f2129e8c8a"]}, @nested={0x1098, 0x28, [@typed={0x14, 0x4b6, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x14, 0x62, @ipv6=@mcast2}, @generic="4a6d3ebb487456adc273e77f88da1d6f5ccc8aaced050a82dbbf953d68f2c608cf6a1efe905b6662238326a81d324fb2420370866863f14737982c551dbf27d7e289cbd3c6d01ee777fb17f8f1c36ac74fd3c53530c3d5186317b253cb30d798bf02f58e4b6fc8c7844068a161d6d5ed455961c6ec86c429d55a1b4bfd507395d071a0b986cd411a85e031e382d71aa8fecef01e42096ad5d1f3f1c30c5c52c2acbfc12b3d7145d9e7b078f912dc76ca036bbdae3e65009ac52ffe2c2262ca91556b982a193e2e1fbb813aae85a09de0291c4360611f9f37c7399f0db7b1db7e4400d3fe99c5b073546edeb2e65343caa048ae60aa1f211981980745e91002f87fb1e270a2f266fd8f6e790333ba9385dc69f465675090bc7763e936e81c1bed2d975d33765480090b5447f2383337966a39ad7f2fefe9bec2e689f8eb318d4658e8b7f5ba7e92ce4bb6823607e702f62d38481fcdd28a84b1b2599b4bc2c5facbf1e3e07808a0358e16cd3810f3f09ad109a6b547c2d74670cde7758d518b48b0c61099cb3f07101f3e56c40e2711c05f545f0d46abdeef98de611027d608942d4c9afa500862f465fc653ec7c2e9b580608a90d7c745964a707bfd0a707caece296bc54c19c9abe79d306ffec4fbfd31cfca4d0fcfa1a65efd413e927d5159b2ae9b48dd88f3dd7100b08e8499819b046c466da1bb146d05adf94fdc2d74cfb236750ba3d99a160881bce45b743ced0f60e3a248074f568a19c30ab90f0b159b41c0fd018b5be11f8155fcd574a6ebb5ee6fd2d181dffd96aad5d88a79333d134e48c0f7ebaa3ee92aab18ae2d1f114471bcd7807a8bb6d2490a37d5655e4d646bf39094237f4cf79932e175693121c6559ed1e5838a7bf42353352ad6fcc004f0083611ad25faca977605a7dc04cd4c204d78fdbc863ea94b94738436fef4492a2825dd649355eab0d653d3919e5767f282cbbd2621c60c1850306e9e5aa9b775efd6009f8ecad6b211dcd4df5ec1072ff0584c11429e0502e92dbf725acc6fd288511a51e927868fe0c415ac264f27a2cddd51485ec4d163c3bcead65b2e5ac59784dfe695fb1d7ea60b2b52f8783b70e4b371a373604607adde4625059259a78afce077270bd8c5c748aa57f03431dfa1211ca1c3231abe8e0dadb1f3eaec88ed099882f4336b755cbb2bcd43d486c1aff2df18052cd7f1709529b0259ec327e25ec9e7781b254b4c3df269eb3bb659d05ae124e0f7b0e1cf1afd90575fb824891425658c96d03b168b69626d67fab16f3826fa6be7e1548f623735235db6031607f68f8bd1f42b829c5a862d2b2c9249f5f767e84408444b2115998b69494bd2fad35e5bb0dcd95160245e382cb35e2a3699d7e6fe98be289f2e60280f8817c9bb98532161dd5bc7f855d033b921cedfcefcf9408205e8a0089a1d40539cc29c1de6b43dc3c136a18b7ed48cdc8ee5556e4b257ddf6b987cb17ca700c6a2a73631cc3a4f5bfd7676aca24123376124f59acc811d860819035ac6fbb1a2e2cc277faa0f7f3423cb4d13a62e4cf75732f68ec4aceffae165c439e8a09cf60afbcd53cc7a2f0ead93d5cb0a669e34ffa6c92b66183d0234e955064dfd7e877c7656d2e53c05007906dda58fa37c0c4d27f65b9605622340a614a0049d9f81b642726623d03855128c6d3d8f564768cf72da968282465d1bfe625701b9d392971f23de1977b4e0dd3a25c08b46ba52bfe71cb77d5eda50d4300f7b37211f3c1cbb943ce4bed2b1960fc3cf7c322e742fd590c6781e91caad71ce4b2e53c47de349f4bc33904f2b32db3b74993875a8451e8d5a44087a49dc11670f29d97e43517ebc560edaf053927d755090db6908f592ff82420fd9545de7a4361ffc0e9309ea7510ebb6a8a416e9de1806ec4bd945afaa78c808d45097e78738e9025da6bdefb7d6755aa80d798871f08be019d867efae3ef740da75165b711cf10ff8f8dc8aa3aaa28e2316c8fb32005e3d31b0661e977274a96020bf07138a56828e68953b308fdd8a39ce989d61406d487125426634527f29fc1047832296eeb4f40a8fb1d1a47dfa9d6ca8673c54c0edf48aeb687a0402fa6e65c1ad552250e2a6737649fc421d0af4ab8beabc78dea58819ee8bf3bb364fa6b3052571fa059f8fe47846dd875603f085f62f0d29d25c7ff10f2d3feb241cd4586f7dfd510d25a2bef3181860b99fb857232d728c6e620531a17cb4552df4d98811ba1ca4b0b9eaf120be4e98d56470b7b024dff90753b62f61e8b9720a2c38ae8cb6f17836473fe79be2cd912c05cb95873972060d75deec8c125e03fcf23a13a5f539ee988ca6bb7f9d207b79469bd8eb8c07145e14475a1cd1246f2cbf142c30cb55f8fc0fe0147d8d9e4182f3dd83eb0c1bb9b9a27ae69b8bc9f53ccd851a335dd649e10a3f7c200fb901ccaf37a9a31c4f2cfc8de9f3b058dd38bdbbfdd155fe6e89523f747100413b5f4108fbe76b9f52e4c6cceff49b6da49247802d3551a08ac1167d263f5b61f2178b6fa5b940736301504c075e5653dc5f099c610c8459870fe3a6ee1710330b5963d9fcb292943d8897c87862a510d096be94f08c8732a9aaad8d9e21ec36b8981400a56f98d58a98d6df2d1ac7b085c6b6662e1d287f700e4dcbd0997956a5ed0259576a89c82b8bb0abef8505283d119aa74ea7a7ee489cdf8bb9306a48686cddec45cc901b45cac901949c4e7e1f628b539bf8bf90c327116ca7504592e11026d5632b160ee45ce547e825c42806664a5644756b734504bc174937d552623f50e4dafea2a54d622afae2a66bcf4eb041a7244e041539403cf586c57d53037fc6e1d2c6cd87feccc684f0da9098b4af09a129baef7f2aa9665535842fccfc811d804ec6d2b2e0f80987a369a590b37240887fec3c620952b54456971028f75a5aa6080973c0ad48fcd730da7f8a380e53d13ebd60e7b78e6b3e3befaba252eda0b2407b7743ab875036a68daddff2efe8bab3ab9509cf8f3866c3a560a437dbcaa7ec254d36a9426acdbce0c6b942ca09d7b1c6e8861938b1526ae39d1e89f7b153fe72d5197bb6fee5bc5bad1e9e9660b6755787adbff683b4f2b45b9c16f5c6fb0a4b1d9e8aca7ac79c0938ff04eb3c5e83f0e108861ba3252f840892ba336b16eccbaede79527a9a03d64a33555e318af880f3dc93e6eed1b661438c4bc8f7dc7f10db0c2997558350a296a2c32f3fdb0e02912380fbdba6996e672ed936a3e62514c70a39e34ce13bd010f8c2394ea29b8224a9fcc1034903c4795e917f21783222098b8f06e09f3707f0ee60b51658775d07e14a00877049301bbbea79164eb9aa5db3cc7e5b5a32d65c4f349a6dcee7911c0204c104767502eea0f67d5e8d73f31ef90a20db3fc51af93d0441772bb3717ed4458ce859e4cd13d212a5a3058a445b260fb0012ab510f36db4478ba1e085a57ec428449d07a89165b7b29606260d2d114596d5b0ceb965e063cd5cf51933cb8dacd7964b60165fdeec074594c90cb80d9437c693aa35ad45a454dababe93baf77a59dd34cb6d1fb3a0324a7757899b38a65de7836e04e063efd61b92d53ea09e343b04fdd4963578b2e904a3062411767f6543c4cc5d966e94248de75c90870c0ff5fa951810227238121d29a03e27720c27bce6f06f93c80fd32645c6373842ccccfc6664b55bf36e2796e81e44e506ad1084784ad9c8d06af31b3f09a929875c33d390df61a259d0511bbc94ba44fcfa0e49a7e01a92a1123706dd79b056284cc06432d6d642f0985ee7803427312c1c4163193364584ce06677e2c3ea2c12b57aef3c1960b2465b54facc1d57c95005145fea2ab48883559f6d4ab1bc17fca17dfd98562f5e9dbc2d75481b676974d017a4532c27d0a1a8f6def75ab293d146458a31774853363c56a7d92c93ac35ae783f9a8f788cbd4900e9bfcfde365b2f2911da38c9a1f758b6d225def2dd2b68af02a0070d963964ef488893e82d9791238a7249d4f050a1ff3a79b20b6f015f8a90fe6c624477d0699c16a9931aba58faf9724834fbdf9006b0a656a14361d922504c09fb571e23ad03a5ebb067650289b71de6b207a2060eda4154d0b3626aa9140f61ef5a64921ff4b73eb86441bdfe574c6b5979242134af3800823be62e2c5f9c39c6c5a3a6aeb75fdd3c097c2ca4b2ad494f1f43c6f7b5308c209ef99111d5211375afe7e1c822e25d3959cd120a8bd4ec18557f01b32de13ecfb5211c7dbdc3b34f6d62de335829ba993baf00b970892040f9e2474cfb693cb5d8a382476f3f416bb5087ec8f7885ed211705ef215464321de4470e00710cdfcef7cf204dae0949daa04c5b4abec58aa808902fffb63b667eb8240a98312954cf5c1cf58b735a8f61a94a57bbaf80c6c03e95b3dbe5b6b8b16e4aa1be0f39f45ccc0173f7e67772997eab6ab9985e4f740789ddd1f24e33e730a0828510acafc27e7ca464e847b7d209bc694f537d2dcddc358653e2c2083619277b04894f5652a716979e547bbff2189f8487a766f38c508b22a92c45294ba33ca3d97d6a4c343b78cb11dfd86121f8a36e137bfd9b6a7fb2c64a2b482b5cf7f38fd84b79da23654db5bb26bef7fba68b60791a79195f701e281af9499f54005c1c6b48d50ecc658f164d2a4ee798cda49be2ebf5468c88e1d7183899ff3b1105d789415df27221785bddc40fbcba533e4de2ab8cce4f891f9ef9d310ff23b66313bfdc753c21e50a1a752278b860894791fa0dec4291d3b065a892e7dfb2c57ea4d54e68bb9a2b1629ad74ed4f84860e594dbafd2d5a0fcea281ab6311820f0a088d07878c222a9279f7e26317978d7f950b0e4f2f794b80b55b897596bcec19b000da74241dd3c4de864ab8f64fb32fb14c6f128101f836b62ec2d7cb7dfb290a8eed018b39a9f2a03779cbfa9b3dde0cde282860c28464044ce03af8db5269811238b8f8d1812a4407303a3dd1a619f2db4c27002e4f35333a71dc569a4db9c6640922acc7b262e421ee95b5e98e7b4782592c95968f2fda3111cf40dbc52d1ffeebbdff261599ff39297fe4fda93d9805bf24f39f535211092c958504ba7e711bf69888205150eb7b250817c551a9a8a64b8608f711f091231736784694fe07488dd939dcc9f837699ca993304aa1fe2d5b3b89c2a00a478e11a6fb33cb940eca5a8abc2519300c409ae54dc1de6a54c752922f84b24a82203358e1dfcb8817d624530e8b86311c28a618d7300733d55f91914452a397a0c44d036a549a64ddc076537f5d137c2e9ca645613a1955d292dd3c7582b387c49275bda33b3bb0531d7ac7eadf3f28c8ec94a81d0297bbb8e48f5676d517078e36d938605709112e7c2aa289b734d6d387b631de7f29c2316ddafcbefd52e51c006707e169263244b4fc9550d11f5a41aa0972e1498f33408bec87187ed8ebe41a7154dcecf13905e37f994858ed090d37b814912b802ae78b850fe8084e897bd4c4c46c18216e04e17b5a427e76384dcb61fecf35fb30e0f33dc455c2be911060039bd4b436123b4f8b5dbdbb3afbd80b8dce614e720976ba5728ca4534b829ef618a08f434f21a313c8ec4149edccfb4a8ebc96b175d8225b276f4e24bebd9af0075cb9caeac1923c84d3b6f78dd4515a18c87f062e3b298cda3bd8f1bb60dca0fb7d7704421e2ea1a695e90153d8fb7058d4520bad0cb616caa31266fe48452622b54f92c47cc8358b3745aa9f59dc8efcf882386ba5d8d9eaba471edfb05a65f71afc", @typed={0x8, 0x22, @str='-\'\x00'}, @typed={0x8, 0x10, @uid=r1}, @generic="8a9992ce32444bf367306e404521a8fb7979e10338f140eaedee5568ef0ae21d79a6b22ab5a7a8abdfa8368f05e1e10f0c1ae50695f8ab2da84530b3fcca13cea7b5cbdda49efe8898de1de17fa747efd010d5bf4f4a", @typed={0x4, 0x38}]}, @nested={0xb8, 0x56, [@generic="f98a047af9afbbd4575eeac8b825062672eeb313dcbef5d88541664754ef0438be4e89cf9f1a2feda991624e76417f76b70bc15fcd23533c003c60f1d9c1d0f73f56b1b074d350b4a5b342723b311ef7530afaf7a0d1cdc11cc7344f04a652d0ad53fdc6ecb59cc173b5475fa5d9997bbc80123b9c5952cdc44d552aa507c6f72d16e14e9b8f0dd14a0cb624c77b27614a04eaa38df16b310bed00bc02a34c341abbb49ba306460d3cf1e1aa6bc566cfbf"]}, @nested={0xfc, 0x52, [@generic="ab71e4af4e8e9e0b49582437f9cdecf9a409b34c83c970e0e003bd9f214e5ff6bf4c4dfbbca8fb12763bc6cb5163f9425502ef49446ec6e7197f9c0e28dc89116c469ed6d2f2a8f873312625be3d43cd82decf36ee2001beffa72d26bfc59b793972c53c9bbc36730d84b9ebcd57ab6f7b19783ccd7da1a1a83ad19324e6346a47eaa7d3ae787a521f4f823638180c892cf03bff9b3fc1e52fb61d5ba572daf4a11e3d454af025ffae359122d57ec2879fc54c21d0d5ac751cbe9253deb325d0b2c0525dddefd8ed9076822b831ae97f4da25c4405e8cedba5c069ec952747e3ae85966b96d71a3411b2da036d61a0846256fab501c8"]}, @typed={0x14, 0xc, @ipv6=@loopback}]}, 0x1484}, 0x1, 0x0, 0x0, 0x800}, 0x80) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1973.739644][T10501] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:33 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x7800}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:34 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8008}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1974.043129][T10688] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1974.106644][T10688] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:34 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x148) 14:52:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:34 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xff0f}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1974.625149][T10820] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1974.656375][T10820] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:34 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x11eff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:35 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670f, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 14:52:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:35 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x100000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1975.353049][T11078] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1975.386021][T11078] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:35 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x1000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1975.662706][T11219] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1975.711712][T11219] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:36 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e933836670e, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3ff, 0x80) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000080)={0x0, @sdr={0x3e377f5f, 0x3f}}) futex(&(0x7f0000000040)=0x3, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000001, 0x1, 0x0, &(0x7f0000000040), 0x0) 14:52:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:36 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x2000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1976.041000][T11345] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1976.079735][T11345] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:36 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x4000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1976.342657][T11730] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1976.455110][T11730] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:36 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x5000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1976.636255][T11809] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1976.655490][T11809] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:36 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) [ 1976.867964][T12155] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1976.884269][T12155] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0xfffffffffffffffc}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8040000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) 14:52:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1977.239649][T12329] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:37 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8800000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1977.328940][T12329] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 14:52:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:52:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) 14:52:37 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x10000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1977.547642][T12499] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1977.575783][T12499] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:52:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 14:52:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:52:38 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x30000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1977.878016][T12657] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 14:52:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:38 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x78000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1978.161681][T13012] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1978.246053][T13012] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:38 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8bffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1978.447285][T13345] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:38 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x0, 0x20a000) mq_getsetattr(r0, &(0x7f0000000240)={0x9, 0x1, 0x1, 0x100000000, 0x7, 0xfff, 0x0, 0x5}, &(0x7f0000000280)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x42, 0x0) ioctl$TIOCEXCL(r1, 0x540c) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x0, 0x0, {"657afd4022e415b64d2e3984ab252b73"}}}}, 0xa0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000001c0)={0xbc5, 0xd2bb, 0x37, 0x8001, 0xe, 0x2, 0x800000000, 0x6, 0xfff, 0x8000}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$IMHOLD_L1(r3, 0x80044948, &(0x7f0000000140)=0x6) accept4$nfc_llcp(r3, 0x0, &(0x7f0000000100), 0x0) 14:52:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1978.544111][T13345] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13b}}, 0xffffffffffffff80) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) r6 = dup2(r3, r4) stat(0x0, 0x0) write$P9_RGETATTR(r6, &(0x7f00000007c0)={0xa0, 0x19, 0x0, {0x0, {0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x101, 0x3, 0x0, 0x7, 0x6, 0x0, 0x0, 0x2000000}}, 0xa0) msgctl$MSG_STAT(0x0, 0xb, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xef, &(0x7f0000000380)="b58807faa239e783718da25f66325fbc4ba5a0321e0511dc0de30162c0a2708e585d0697d96ab914bc5fc1251c8dace40e335a7de5cd8ca3bc4343", 0x3b) setsockopt$ALG_SET_AEAD_AUTHSIZE(r6, 0x117, 0x5, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r5, 0x89e7, &(0x7f0000000100)={@remote, @null, 0x2, 0x64}) ioctl$ASHMEM_SET_SIZE(r6, 0x40087703, 0x4fea) sendto$inet(r3, &(0x7f0000000000), 0xa805000005000000, 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0xaaf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x40}, &(0x7f0000000140)=0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) lseek(0xffffffffffffffff, 0x0, 0x4) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) 14:52:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:39 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xa1ffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1978.814869][T13484] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1978.897081][T13484] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:39 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xe4ffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) [ 1979.159049][T13675] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1979.215789][T13675] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(r1, 0x0, 0x20000001) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040)={0x0, 0xa, 0x1, 0x4}, 0x6) 14:52:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:39 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xf4ffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1979.531835][T13840] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1979.570178][T13840] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:39 executing program 5: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x5}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:39 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xfeffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x3, 0x1, 0x0, [], 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) r3 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="600100000000000001000000000000000200000000000000030000000000000000100000000000000500000000000000010000800000000001000000000000006d0e0000000000000300000000000000ffffffffffffffffff00000000000000ff7f000000000000060000000200000000000000ff07000001000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="09000000a909000000000000000000000000000000000000000000000c000000040000002f6465762f766964656f2300000000000400000000000000030000000000000005000000000000000009000000847f9d4505000000000000000900000000000000fcffffffffff337bc06cf05c258b8736155effff030000000000000003000000000000000700000000000000f9ffffff090000006ee6b63cacab67", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="030000000700000000000000010000000000000000010000000000000c000000060000002f6465762f766964656f230000000000"], 0x160) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 14:52:40 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r0, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0}}, 0x48) [ 1979.808466][T14191] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1979.884129][T14191] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:40 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r0, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0}}, 0x48) 14:52:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:40 executing program 5 (fault-call:4 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:40 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xff0f0000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1980.072353][T14387] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1980.110526][T14387] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1980.121230][T14392] FAULT_INJECTION: forcing a failure. [ 1980.121230][T14392] name failslab, interval 1, probability 0, space 0, times 0 14:52:40 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r0, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r0}}, 0x48) [ 1980.178564][T14392] CPU: 0 PID: 14392 Comm: syz-executor.5 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1980.187720][T14392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1980.197780][T14392] Call Trace: [ 1980.201089][T14392] dump_stack+0x172/0x1f0 [ 1980.205441][T14392] should_fail.cold+0xa/0x15 [ 1980.210049][T14392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1980.215865][T14392] ? ___might_sleep+0x163/0x280 [ 1980.220755][T14392] __should_failslab+0x121/0x190 [ 1980.225716][T14392] should_failslab+0x9/0x14 [ 1980.230228][T14392] kmem_cache_alloc_trace+0x2d1/0x760 [ 1980.235606][T14392] ? __radix_tree_lookup+0x1ef/0x260 [ 1980.240902][T14392] cma_alloc_port+0x4d/0x190 [ 1980.245493][T14392] rdma_bind_addr+0x1658/0x1f80 [ 1980.250346][T14392] ? mutex_trylock+0x1e0/0x1e0 [ 1980.255121][T14392] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 1980.260577][T14392] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1980.266824][T14392] ? wait_for_completion+0x440/0x440 [ 1980.272112][T14392] rdma_listen+0xa3/0x970 [ 1980.276442][T14392] ucma_listen+0x14d/0x1c0 [ 1980.280853][T14392] ? ucma_notify+0x190/0x190 [ 1980.285443][T14392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1980.291683][T14392] ? _copy_from_user+0xdd/0x150 [ 1980.296533][T14392] ucma_write+0x2da/0x3c0 [ 1980.300887][T14392] ? ucma_notify+0x190/0x190 [ 1980.305490][T14392] ? ucma_open+0x290/0x290 [ 1980.309915][T14392] ? apparmor_file_permission+0x25/0x30 [ 1980.315460][T14392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1980.321708][T14392] ? security_file_permission+0x94/0x380 [ 1980.327356][T14392] __vfs_write+0x8d/0x110 [ 1980.331684][T14392] ? ucma_open+0x290/0x290 [ 1980.336097][T14392] vfs_write+0x20c/0x580 [ 1980.340350][T14392] ksys_write+0xea/0x1f0 [ 1980.344688][T14392] ? __ia32_sys_read+0xb0/0xb0 [ 1980.349448][T14392] ? do_syscall_64+0x26/0x610 [ 1980.354143][T14392] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1980.360212][T14392] ? do_syscall_64+0x26/0x610 [ 1980.364888][T14392] __x64_sys_write+0x73/0xb0 [ 1980.369476][T14392] do_syscall_64+0x103/0x610 [ 1980.374077][T14392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1980.379959][T14392] RIP: 0033:0x457e29 [ 1980.383847][T14392] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1980.403442][T14392] RSP: 002b:00007f9cf1a6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1980.411856][T14392] RAX: ffffffffffffffda RBX: 00007f9cf1a6fc90 RCX: 0000000000457e29 [ 1980.419842][T14392] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1980.427810][T14392] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1980.435773][T14392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9cf1a706d4 [ 1980.443736][T14392] R13: 00000000004c706f R14: 00000000004dca78 R15: 0000000000000004 14:52:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:40 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xff1e0100}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:40 executing program 5 (fault-call:4 fault-nth:1): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1980.674606][T14525] FAULT_INJECTION: forcing a failure. [ 1980.674606][T14525] name failslab, interval 1, probability 0, space 0, times 0 14:52:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 14:52:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1980.719637][T14525] CPU: 0 PID: 14525 Comm: syz-executor.5 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1980.728785][T14525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1980.738851][T14525] Call Trace: [ 1980.742173][T14525] dump_stack+0x172/0x1f0 [ 1980.746521][T14525] should_fail.cold+0xa/0x15 [ 1980.751137][T14525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1980.756958][T14525] ? ___might_sleep+0x163/0x280 [ 1980.761817][T14525] __should_failslab+0x121/0x190 [ 1980.766767][T14525] should_failslab+0x9/0x14 [ 1980.771315][T14525] kmem_cache_alloc+0x2be/0x710 [ 1980.771345][T14525] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 1980.771366][T14525] radix_tree_extend+0x25b/0x4d0 [ 1980.771401][T14525] idr_get_free+0x5a8/0x8d0 [ 1980.771424][T14525] idr_alloc_u32+0x19e/0x330 [ 1980.782517][T14525] ? __fprop_inc_percpu_max+0x230/0x230 [ 1980.782537][T14525] ? cma_pernet_idr+0x13f/0x2e0 [ 1980.782559][T14525] idr_alloc+0xe5/0x150 [ 1980.782574][T14525] ? idr_alloc_u32+0x330/0x330 [ 1980.782589][T14525] ? kasan_check_read+0x11/0x20 [ 1980.782607][T14525] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1980.782624][T14525] cma_alloc_port+0xab/0x190 [ 1980.782649][T14525] rdma_bind_addr+0x1658/0x1f80 [ 1980.836095][T14525] ? mutex_trylock+0x1e0/0x1e0 [ 1980.840874][T14525] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 1980.846346][T14525] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1980.852598][T14525] ? wait_for_completion+0x440/0x440 [ 1980.857891][T14525] rdma_listen+0xa3/0x970 [ 1980.862236][T14525] ucma_listen+0x14d/0x1c0 14:52:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) [ 1980.866661][T14525] ? ucma_notify+0x190/0x190 [ 1980.871260][T14525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1980.877502][T14525] ? _copy_from_user+0xdd/0x150 [ 1980.882362][T14525] ucma_write+0x2da/0x3c0 [ 1980.886694][T14525] ? ucma_notify+0x190/0x190 [ 1980.891287][T14525] ? ucma_open+0x290/0x290 [ 1980.895719][T14525] ? apparmor_file_permission+0x25/0x30 [ 1980.901273][T14525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1980.907526][T14525] ? security_file_permission+0x94/0x380 [ 1980.913159][T14525] __vfs_write+0x8d/0x110 [ 1980.913177][T14525] ? ucma_open+0x290/0x290 [ 1980.913193][T14525] vfs_write+0x20c/0x580 [ 1980.913212][T14525] ksys_write+0xea/0x1f0 [ 1980.913229][T14525] ? __ia32_sys_read+0xb0/0xb0 [ 1980.913255][T14525] ? do_syscall_64+0x26/0x610 [ 1980.939938][T14525] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1980.946012][T14525] ? do_syscall_64+0x26/0x610 [ 1980.950752][T14525] __x64_sys_write+0x73/0xb0 [ 1980.955346][T14525] do_syscall_64+0x103/0x610 [ 1980.959939][T14525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1980.965827][T14525] RIP: 0033:0x457e29 [ 1980.969726][T14525] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1980.989346][T14525] RSP: 002b:00007f9cf1a6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1980.997769][T14525] RAX: ffffffffffffffda RBX: 00007f9cf1a6fc90 RCX: 0000000000457e29 [ 1981.005743][T14525] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 14:52:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1981.013711][T14525] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1981.021917][T14525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9cf1a706d4 [ 1981.029904][T14525] R13: 00000000004c706f R14: 00000000004dca78 R15: 0000000000000004 14:52:41 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xffffff7f}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) [ 1981.086744][T14654] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1981.103404][T14654] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:41 executing program 5 (fault-call:4 fault-nth:2): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x7fffffff}}, 0x48) 14:52:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:41 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xffffff8b}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) [ 1981.401382][T14870] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1981.478552][T14870] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1981.492292][T14908] FAULT_INJECTION: forcing a failure. [ 1981.492292][T14908] name failslab, interval 1, probability 0, space 0, times 0 [ 1981.533720][T14908] CPU: 0 PID: 14908 Comm: syz-executor.5 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1981.542867][T14908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1981.552920][T14908] Call Trace: [ 1981.556221][T14908] dump_stack+0x172/0x1f0 [ 1981.560559][T14908] should_fail.cold+0xa/0x15 [ 1981.565152][T14908] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1981.570963][T14908] ? ___might_sleep+0x163/0x280 [ 1981.575818][T14908] __should_failslab+0x121/0x190 [ 1981.580763][T14908] should_failslab+0x9/0x14 [ 1981.585262][T14908] kmem_cache_alloc+0x2be/0x710 [ 1981.590119][T14908] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 1981.596364][T14908] radix_tree_extend+0x25b/0x4d0 [ 1981.601311][T14908] idr_get_free+0x5a8/0x8d0 [ 1981.605825][T14908] idr_alloc_u32+0x19e/0x330 [ 1981.610414][T14908] ? __fprop_inc_percpu_max+0x230/0x230 [ 1981.616084][T14908] ? cma_pernet_idr+0x13f/0x2e0 [ 1981.620943][T14908] idr_alloc+0xe5/0x150 [ 1981.625094][T14908] ? idr_alloc_u32+0x330/0x330 [ 1981.629853][T14908] ? kasan_check_read+0x11/0x20 [ 1981.634699][T14908] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1981.640590][T14908] cma_alloc_port+0xab/0x190 [ 1981.645178][T14908] rdma_bind_addr+0x1658/0x1f80 [ 1981.650026][T14908] ? mutex_trylock+0x1e0/0x1e0 [ 1981.654802][T14908] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 1981.660254][T14908] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1981.666495][T14908] ? wait_for_completion+0x440/0x440 [ 1981.671781][T14908] rdma_listen+0xa3/0x970 [ 1981.676113][T14908] ucma_listen+0x14d/0x1c0 [ 1981.680525][T14908] ? ucma_notify+0x190/0x190 [ 1981.685113][T14908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1981.691353][T14908] ? _copy_from_user+0xdd/0x150 [ 1981.696204][T14908] ucma_write+0x2da/0x3c0 [ 1981.700528][T14908] ? ucma_notify+0x190/0x190 [ 1981.705115][T14908] ? ucma_open+0x290/0x290 [ 1981.709527][T14908] ? apparmor_file_permission+0x25/0x30 [ 1981.715074][T14908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1981.721322][T14908] ? security_file_permission+0x94/0x380 [ 1981.726956][T14908] __vfs_write+0x8d/0x110 [ 1981.731280][T14908] ? ucma_open+0x290/0x290 [ 1981.735696][T14908] vfs_write+0x20c/0x580 [ 1981.739942][T14908] ksys_write+0xea/0x1f0 [ 1981.744183][T14908] ? __ia32_sys_read+0xb0/0xb0 [ 1981.748943][T14908] ? do_syscall_64+0x26/0x610 [ 1981.753620][T14908] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1981.759678][T14908] ? do_syscall_64+0x26/0x610 [ 1981.764356][T14908] __x64_sys_write+0x73/0xb0 [ 1981.768944][T14908] do_syscall_64+0x103/0x610 [ 1981.773540][T14908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1981.779426][T14908] RIP: 0033:0x457e29 [ 1981.783326][T14908] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1981.802923][T14908] RSP: 002b:00007f9cf1a6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1981.811329][T14908] RAX: ffffffffffffffda RBX: 00007f9cf1a6fc90 RCX: 0000000000457e29 [ 1981.819292][T14908] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1981.827265][T14908] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:52:42 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xffffffa1}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) [ 1981.835229][T14908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9cf1a706d4 [ 1981.843191][T14908] R13: 00000000004c706f R14: 00000000004dca78 R15: 0000000000000004 14:52:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) [ 1981.956704][T15070] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1981.989488][T15070] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:42 executing program 5 (fault-call:4 fault-nth:3): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:42 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xffffffe4}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, 0xffffffffffffffff, 0x7fffffff}}, 0x48) 14:52:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1982.177776][T15223] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1982.208176][T15223] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1982.278941][T15289] FAULT_INJECTION: forcing a failure. [ 1982.278941][T15289] name failslab, interval 1, probability 0, space 0, times 0 [ 1982.313749][T15289] CPU: 0 PID: 15289 Comm: syz-executor.5 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1982.322916][T15289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1982.332983][T15289] Call Trace: [ 1982.336287][T15289] dump_stack+0x172/0x1f0 [ 1982.340672][T15289] should_fail.cold+0xa/0x15 [ 1982.345291][T15289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1982.351129][T15289] ? ___might_sleep+0x163/0x280 [ 1982.355996][T15289] __should_failslab+0x121/0x190 [ 1982.360951][T15289] should_failslab+0x9/0x14 [ 1982.365460][T15289] kmem_cache_alloc+0x2be/0x710 [ 1982.370318][T15289] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1982.376561][T15289] ? radix_tree_node_alloc.constprop.0+0x1be/0x340 [ 1982.383071][T15289] ? memset+0x32/0x40 [ 1982.387063][T15289] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 1982.393326][T15289] idr_get_free+0x425/0x8d0 [ 1982.397840][T15289] idr_alloc_u32+0x19e/0x330 [ 1982.402433][T15289] ? __fprop_inc_percpu_max+0x230/0x230 [ 1982.407981][T15289] ? cma_pernet_idr+0x13f/0x2e0 [ 1982.412842][T15289] idr_alloc+0xe5/0x150 [ 1982.416998][T15289] ? idr_alloc_u32+0x330/0x330 [ 1982.421790][T15289] ? kasan_check_read+0x11/0x20 [ 1982.426649][T15289] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1982.432548][T15289] cma_alloc_port+0xab/0x190 [ 1982.437147][T15289] rdma_bind_addr+0x1658/0x1f80 [ 1982.442003][T15289] ? mutex_trylock+0x1e0/0x1e0 [ 1982.446791][T15289] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 1982.452272][T15289] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1982.458525][T15289] ? wait_for_completion+0x440/0x440 [ 1982.463815][T15289] rdma_listen+0xa3/0x970 [ 1982.468149][T15289] ucma_listen+0x14d/0x1c0 [ 1982.472566][T15289] ? ucma_notify+0x190/0x190 [ 1982.477155][T15289] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1982.483395][T15289] ? _copy_from_user+0xdd/0x150 [ 1982.488250][T15289] ucma_write+0x2da/0x3c0 [ 1982.492576][T15289] ? ucma_notify+0x190/0x190 [ 1982.497166][T15289] ? ucma_open+0x290/0x290 [ 1982.501579][T15289] ? apparmor_file_permission+0x25/0x30 [ 1982.507144][T15289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1982.513390][T15289] ? security_file_permission+0x94/0x380 [ 1982.519040][T15289] __vfs_write+0x8d/0x110 [ 1982.523371][T15289] ? ucma_open+0x290/0x290 [ 1982.527791][T15289] vfs_write+0x20c/0x580 [ 1982.532045][T15289] ksys_write+0xea/0x1f0 [ 1982.536298][T15289] ? __ia32_sys_read+0xb0/0xb0 [ 1982.541072][T15289] ? do_syscall_64+0x26/0x610 [ 1982.545760][T15289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1982.551828][T15289] ? do_syscall_64+0x26/0x610 [ 1982.556515][T15289] __x64_sys_write+0x73/0xb0 [ 1982.561104][T15289] do_syscall_64+0x103/0x610 [ 1982.565700][T15289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1982.571587][T15289] RIP: 0033:0x457e29 [ 1982.575484][T15289] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1982.595114][T15289] RSP: 002b:00007f9cf1a6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1982.603527][T15289] RAX: ffffffffffffffda RBX: 00007f9cf1a6fc90 RCX: 0000000000457e29 [ 1982.611498][T15289] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1982.619549][T15289] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:52:42 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xfffffff4}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1982.627514][T15289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9cf1a706d4 [ 1982.635482][T15289] R13: 00000000004c706f R14: 00000000004dca78 R15: 0000000000000004 14:52:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:42 executing program 5 (fault-call:4 fault-nth:4): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) [ 1982.762439][T15469] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1982.776727][T15497] FAULT_INJECTION: forcing a failure. [ 1982.776727][T15497] name failslab, interval 1, probability 0, space 0, times 0 14:52:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1982.816061][T15469] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1982.829305][T15497] CPU: 1 PID: 15497 Comm: syz-executor.5 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1982.838450][T15497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1982.848523][T15497] Call Trace: [ 1982.851843][T15497] dump_stack+0x172/0x1f0 [ 1982.856196][T15497] should_fail.cold+0xa/0x15 [ 1982.860809][T15497] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1982.866633][T15497] ? ___might_sleep+0x163/0x280 [ 1982.871509][T15497] __should_failslab+0x121/0x190 [ 1982.876463][T15497] should_failslab+0x9/0x14 [ 1982.880988][T15497] kmem_cache_alloc+0x2be/0x710 [ 1982.885844][T15497] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1982.892097][T15497] ? radix_tree_node_alloc.constprop.0+0x1be/0x340 [ 1982.898620][T15497] radix_tree_node_alloc.constprop.0+0x82/0x340 [ 1982.904874][T15497] idr_get_free+0x425/0x8d0 [ 1982.909391][T15497] idr_alloc_u32+0x19e/0x330 [ 1982.914006][T15497] ? __fprop_inc_percpu_max+0x230/0x230 [ 1982.919570][T15497] ? cma_pernet_idr+0x13f/0x2e0 [ 1982.924438][T15497] idr_alloc+0xe5/0x150 [ 1982.928609][T15497] ? idr_alloc_u32+0x330/0x330 [ 1982.933388][T15497] ? kasan_check_read+0x11/0x20 [ 1982.938253][T15497] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1982.944189][T15497] cma_alloc_port+0xab/0x190 [ 1982.948794][T15497] rdma_bind_addr+0x1658/0x1f80 [ 1982.953672][T15497] ? mutex_trylock+0x1e0/0x1e0 [ 1982.958455][T15497] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 1982.963926][T15497] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1982.970202][T15497] ? wait_for_completion+0x440/0x440 [ 1982.975510][T15497] rdma_listen+0xa3/0x970 [ 1982.979862][T15497] ucma_listen+0x14d/0x1c0 [ 1982.984293][T15497] ? ucma_notify+0x190/0x190 [ 1982.988896][T15497] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1982.995151][T15497] ? _copy_from_user+0xdd/0x150 [ 1983.000014][T15497] ucma_write+0x2da/0x3c0 [ 1983.004366][T15497] ? ucma_notify+0x190/0x190 [ 1983.008990][T15497] ? ucma_open+0x290/0x290 [ 1983.013424][T15497] ? apparmor_file_permission+0x25/0x30 [ 1983.018981][T15497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1983.025564][T15497] ? security_file_permission+0x94/0x380 [ 1983.031217][T15497] __vfs_write+0x8d/0x110 [ 1983.035564][T15497] ? ucma_open+0x290/0x290 [ 1983.039998][T15497] vfs_write+0x20c/0x580 [ 1983.044276][T15497] ksys_write+0xea/0x1f0 [ 1983.048542][T15497] ? __ia32_sys_read+0xb0/0xb0 [ 1983.053600][T15497] ? do_syscall_64+0x26/0x610 [ 1983.058294][T15497] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1983.064411][T15497] ? do_syscall_64+0x26/0x610 [ 1983.069125][T15497] __x64_sys_write+0x73/0xb0 [ 1983.073744][T15497] do_syscall_64+0x103/0x610 [ 1983.078370][T15497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1983.084271][T15497] RIP: 0033:0x457e29 [ 1983.088170][T15497] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1983.107786][T15497] RSP: 002b:00007f9cf1a6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:52:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1983.116223][T15497] RAX: ffffffffffffffda RBX: 00007f9cf1a6fc90 RCX: 0000000000457e29 [ 1983.124207][T15497] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1983.132183][T15497] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1983.140151][T15497] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9cf1a706d4 [ 1983.148118][T15497] R13: 00000000004c706f R14: 00000000004dca78 R15: 0000000000000004 14:52:43 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xfffffffe}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:43 executing program 5 (fault-call:4 fault-nth:5): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) [ 1983.360635][T15783] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1983.407537][T15783] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:43 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x16, 0x8, 0xfa00, {r2}}, 0x10) 14:52:43 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xffffffff000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1983.630726][T15905] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1983.650802][T15912] FAULT_INJECTION: forcing a failure. [ 1983.650802][T15912] name failslab, interval 1, probability 0, space 0, times 0 [ 1983.672062][T15905] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1983.689644][T15912] CPU: 0 PID: 15912 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1983.698771][T15912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1983.708834][T15912] Call Trace: [ 1983.712145][T15912] dump_stack+0x172/0x1f0 [ 1983.716485][T15912] should_fail.cold+0xa/0x15 [ 1983.721089][T15912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1983.726905][T15912] ? ___might_sleep+0x163/0x280 [ 1983.731760][T15912] __should_failslab+0x121/0x190 [ 1983.736705][T15912] should_failslab+0x9/0x14 [ 1983.741214][T15912] kmem_cache_alloc_trace+0x2d1/0x760 [ 1983.746586][T15912] ? __radix_tree_lookup+0x1ef/0x260 [ 1983.751878][T15912] cma_alloc_port+0x4d/0x190 [ 1983.756467][T15912] rdma_bind_addr+0x1658/0x1f80 [ 1983.761328][T15912] ? find_held_lock+0x35/0x130 [ 1983.766091][T15912] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 1983.771566][T15912] ? lock_downgrade+0x880/0x880 [ 1983.776418][T15912] rdma_resolve_addr+0x437/0x2200 [ 1983.781446][T15912] ? kasan_check_write+0x14/0x20 [ 1983.786380][T15912] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1983.791925][T15912] ? lock_downgrade+0x880/0x880 [ 1983.796775][T15912] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1983.803018][T15912] ? rdma_bind_addr+0x1f80/0x1f80 [ 1983.808073][T15912] ucma_resolve_ip+0x153/0x210 [ 1983.812833][T15912] ? ucma_resolve_ip+0x153/0x210 [ 1983.817765][T15912] ? ucma_query+0x820/0x820 [ 1983.822278][T15912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1983.828525][T15912] ? _copy_from_user+0xdd/0x150 [ 1983.833379][T15912] ucma_write+0x2da/0x3c0 [ 1983.837704][T15912] ? ucma_query+0x820/0x820 [ 1983.842208][T15912] ? ucma_open+0x290/0x290 [ 1983.846622][T15912] ? apparmor_file_permission+0x25/0x30 [ 1983.852170][T15912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1983.858407][T15912] ? security_file_permission+0x94/0x380 [ 1983.864049][T15912] __vfs_write+0x8d/0x110 [ 1983.868378][T15912] ? ucma_open+0x290/0x290 [ 1983.872795][T15912] vfs_write+0x20c/0x580 [ 1983.877051][T15912] ksys_write+0xea/0x1f0 [ 1983.881292][T15912] ? __ia32_sys_read+0xb0/0xb0 [ 1983.886069][T15912] ? do_syscall_64+0x26/0x610 [ 1983.890744][T15912] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1983.896809][T15912] ? do_syscall_64+0x26/0x610 [ 1983.901494][T15912] __x64_sys_write+0x73/0xb0 [ 1983.906085][T15912] do_syscall_64+0x103/0x610 [ 1983.910680][T15912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1983.916564][T15912] RIP: 0033:0x457e29 [ 1983.920459][T15912] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1983.940077][T15912] RSP: 002b:00007fc4a4bdec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1983.948492][T15912] RAX: ffffffffffffffda RBX: 00007fc4a4bdec90 RCX: 0000000000457e29 [ 1983.956458][T15912] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1983.964427][T15912] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1983.972394][T15912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4a4bdf6d4 [ 1983.980362][T15912] R13: 00000000004cd920 R14: 00000000004dcb20 R15: 0000000000000004 14:52:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:44 executing program 3 (fault-call:3 fault-nth:1): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:44 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x800800000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x200001c8, 0xfa00, {r2}}, 0x10) 14:52:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1984.236397][T16250] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1984.258481][T16250] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x200001d0, 0xfa00, {r2}}, 0x10) 14:52:44 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x10000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1984.511516][T16578] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1984.599589][T16679] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa02, {r2}}, 0x10) 14:52:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7a, 0x8000) ioctl$CAPI_INSTALLED(r2, 0x80024322) 14:52:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:44 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xf0ffffff0f0000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1984.854258][T16909] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1984.873379][T16909] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) ioctl$FICLONE(r0, 0x40049409, r0) timer_create(0x3, &(0x7f0000000040)={0x0, 0x3b, 0x4, @thr={&(0x7f00000001c0)="8d7b8bc5a8451f7aeaa3d448693f7a3f7af59d0d2d51d11c7d4d87dda13337e61094dcc369751d4fe5162a94f3c51848bf2c98bbc73b76f6d863cba898595b853cc3111e8f20ccdd1670fe11ab4e2d118fa9e7d6b8a2915e8585cdf57dcc669849a6db5734ae2d7d319412b211f897f4765794ebdf9fbd6682f996232a416aa34ba8aa4986f626da6278742803f9e5f719677601827f7a1f4206a9cab8a54af21f5ff2eeac5a62bb0712614c2ba1def65ffe4c75c665d319312f762ba01bba720fb3f5b2e623c4da812a56364669e46a97c03fb8f4447eddc6908d3a1f835ab47d56e4e4ed2083", &(0x7f00000002c0)="8d0cf0de0721c1fb8da578540b9a27687076ed1a9273e8a7e2468851ae047ef090e389884bf655d16d629ef0ec15cd85fa28f5fbb75e149dec7b507f917affe5cbe55b4ef067218661bfac3cff520952fc79bc71ef9f12793f776007692a73375cf0fa35ff00d0055b66ef1d4fdd5932c99c76b097feab8120eed1bb0f7fdccbd2eec368aaabaacb9a0db57a4a5a2ebb4366a01ff3b610824f"}}, &(0x7f0000000380)=0x0) timer_gettime(r2, &(0x7f00000003c0)) 14:52:45 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x100000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 14:52:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1985.056215][T17230] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1985.133960][T17230] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xdfc60f5, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280", 0xfffffffffffffffd}, r1}}, 0xfffffffffffffe1a) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xbcf, 0x80) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000001c0)=0x2, 0x4) 14:52:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0x88d3}}, 0x10) 14:52:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:45 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x200000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) fcntl$setstatus(r0, 0x4, 0x400) [ 1985.439683][T17652] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1985.514541][T17796] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0xd388}}, 0x10) 14:52:45 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x400000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20001, 0x0) getpeername$llc(r2, &(0x7f0000000300), &(0x7f0000000340)=0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r1, 0xa1, "a90687", "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"}}, 0x110) accept$ax25(r2, &(0x7f0000000380)={{0x3, @null}, [@default, @default, @bcast, @null, @rose, @bcast, @default]}, &(0x7f0000000440)=0x48) 14:52:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0x2000000}}, 0x10) [ 1985.777571][T18082] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1985.810251][T18082] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xffff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:46 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x500000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x142, 0x1006}}, 0xfffffe4f) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1986.092890][T18378] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0x88d30000}}, 0x10) 14:52:46 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x800000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1986.165051][T18378] kernel msg: ebtables bug: please report to author: Wrong len argument 14:52:46 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x401, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) readahead(r0, 0x7, 0xcd) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, r1, 0x3c, 0x0, @ib={0x1b, 0x9, 0x3f79, {"20306228624e710e1b9253c7fd0c3344"}, 0x7, 0xd39c, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:46 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x804000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0x200000000000000}}, 0x10) 14:52:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x200000) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000200)=""/115) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1986.531674][T19073] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1986.602772][T19073] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:46 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x1000000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 14:52:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x142}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0x88d3000000000000}}, 0x10) 14:52:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:47 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x3000000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1986.909473][T19490] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) [ 1986.969330][T19490] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 14:52:47 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x7800000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0xa, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x7) 14:52:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x200001d0) 14:52:47 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8000000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1987.394025][T20105] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000a0}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r3, 0x10, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x7f, @media='udp\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x4010) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:52:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) [ 1987.510355][T20105] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x28000, 0x0) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f00000001c0)={0x1, 0x7e, 0x100}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000200)=0x3) 14:52:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:52:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe37, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x183000, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@random={'system.', '-#\x00'}) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000480)={0x2, 0x0, 0x2080, {0x5000, 0x7000, 0x2}, [], "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", "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"}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:47 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x8bffffff00000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1987.793486][T20402] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:52:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="06000800ce00010002000400000005000801ff0f"], &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e20, 0xffffffff80000001, @remote, 0xa6}}, [0xe43, 0x80, 0x9, 0x3, 0x766, 0x7, 0x10000, 0x7, 0x6, 0xfdb2, 0x3, 0x7fffffff, 0x4, 0xf8da, 0xfffffffffffffffa]}, &(0x7f0000000380)=0x100) [ 1987.864313][T20402] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000240)=@ethernet={0x0, @link_local}, &(0x7f0000000180)=0x80) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x9}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000001900)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)=0x1008) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r3}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x1, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r5, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r6, 0x702, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x4000000) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f00000007c0)={0x16, @broadcast, 0x4e21, 0x2, 'lc\x00', 0x20, 0x7fff, 0x7b}, 0x2c) 14:52:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) 14:52:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f00000001c0)={0x4dc13aff, 0x6}) 14:52:48 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xa1ffffff00000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:48 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') setxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) [ 1988.141274][T20837] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1988.175799][T20860] Unknown ioctl 1078743882 14:52:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1988.212138][T20837] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x210000, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @empty}, &(0x7f0000000280)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000180)=0x8) 14:52:48 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffd37, 0xfa00, {0x2000, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xb}}, 0x15b) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0xfffffffd, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x8001}, {0xa, 0x0, 0x9, @rand_addr="4875e156264f54ef63420d1ed0262280", 0x40}, r0}}, 0x48) 14:52:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:48 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xe4ffffff00000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1988.507129][T21214] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0xffffffffffffffff, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1, 0x8000000}}, 0xfffffffffffffd39) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) r3 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x800) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x3ff, 0x7, 0x401}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000480)={r4, @in6={{0xa, 0x4e22, 0x80000001, @dev={0xfe, 0x80, [], 0x28}, 0xfffffffffffffffd}}, 0x4, 0x7fffffff}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) ioctl$sock_ifreq(r2, 0x891c, &(0x7f00000001c0)={'bpq0\x00', @ifru_hwaddr=@random="486fd03045f4"}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1988.556222][T21344] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) 14:52:48 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xf4ffffff00000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1988.865332][T21701] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1988.903685][T21701] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x6e, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) 14:52:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = dup2(r0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000140)={@local, 0x5, 0x1, 0x1, 0x1, 0x4, 0x8}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x1, &(0x7f0000000180)='\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r4, 0x4) 14:52:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x8000000000000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101000, 0x0) sendmmsg$inet_sctp(r2, &(0x7f00000004c0)=[{&(0x7f00000001c0)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000200)="4c8eaa504dd383acc865f5763e5685e8f066efc3caa98f49605b3b9df37dda3b1ee9d62c6e27845091a7c943e7158977551da6d1f1f71083f985f32fe44cef4af180b6d7126ce08fe08c143219df66eeb1a5f4f9fff20715a6637f4c6682aaaf3e2c5924625742666b532fab379fa5af5d0156591323b15230c1168a95881d37fbd28941598818e355ca1ddbabb47d7bbe2e21761ebf731ffcba457024351457a724d0fe032b85d2ba2e947f2fced5cba39eb57cef380ecc3c70fe614080", 0xbe}, {&(0x7f00000002c0)="859cd166eaefa0168fbdcb78cf754e7178786ddfa47be25d4d65a3d93b50000861d9d859b18ea9ee237308777e95b64ded2573def9569a50fdd4607f74d7111619eea05d6b36a1535817db7662c3ebc4ea6802499200786f65861d9cbde19a3e61c2521ca735719170f8edc6fe960269d36d10b76cb3cbba799c869bb03a2d198dcbf1cc6a66f8361dfec55b0ab52e53e660a735a33c01d6bd7182216516b8d9e0da4a735d2f59e4e70bd1d299d03c28c00c61bbde9152a6603561013bb0ff96a76ce29613", 0xc5}, {&(0x7f00000003c0)="e0a5", 0x2}], 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="000200000000b0253245c19a6400000000"], 0x18}], 0x1, 0x8004) 14:52:49 executing program 2: setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, &(0x7f0000000380)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x0, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) sendmsg$kcm(r1, &(0x7f00000006c0)={&(0x7f0000000400)=@ll={0x11, 0xff, r2, 0x1, 0x7, 0x6, @random="1100c2d4965d"}, 0x80, 0x0, 0x0, &(0x7f0000000b40)=ANY=[]}, 0x8040) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffff0b, 0x4000, 0x0, 0xfffffffffffffefc) sendmsg$alg(0xffffffffffffffff, 0x0, 0x20048000) read(0xffffffffffffffff, &(0x7f0000000980)=""/100, 0x64) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") ioctl$sock_inet_SIOCGARP(r0, 0x8954, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x8) accept4(r0, &(0x7f0000000a80)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000700)=0x80, 0x800) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 14:52:49 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xfeffffff00000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1989.340175][T21923] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:49 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xff0f000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280), r1, 0x0, 0x1, 0x4}}, 0x20) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x100) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x3, r4}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1989.429715][T21923] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x80000000, 0x1) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000200)={0x6, "a9608a956d53bd667011e644fc1fc5d6cef51186daeeff00b1f0261780afea1e", 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x381, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r3 = dup(r0) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) 14:52:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmat(0x0, &(0x7f0000ff6000/0x3000)=nil, 0x6fff) mremap(&(0x7f0000fec000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) shmdt(r1) 14:52:49 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000100) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) lseek(r0, 0x0, 0x3) 14:52:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:49 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xff1e010000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1989.665852][T22461] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x10000, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000006, 0x40010, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 1989.729192][T22461] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = mq_open(&(0x7f0000000200)='/dev/vga_arbiter\x00', 0x41, 0x20, &(0x7f0000000240)={0x3, 0x1, 0x6, 0x20000000, 0x7fff, 0xffffffffffff7fff, 0x28000000000000, 0x3}) mq_notify(r2, &(0x7f0000000400)={0x0, 0x39, 0x6, @thr={&(0x7f0000000280)="34a88f84e31e09bc03a84aad6b2d475ad471711bbec73ade617b2fbe385122fecd04e9779ef2a142eff0cf2144aa5754d59cabdad77cc805c0559f8ee3bb12ecab25937de4c382b12d535586489895ac7f089930aeac8b0f68278151e5a0e0bc0fa0bd7b53be2e1f53165ffd62f270e226463486efd056429c61845c45665703", &(0x7f0000000300)="ba30c971e8cb66c711bed50add6df789688c999de26dbbc4b38fd936f0e55b5ecdfe1e2b6a42d9b038818eeb1e23b4c77087be9af2ba32068f65756388f48ceb250080407b31bf69ede9d06eba428d68e11bc04b28743800ac0e4bfde5af3fc29410a4e63d0ce99c95f63fceb1b7cd94e92e44c7419fcc1dfebc6b943e83d61fb773549c6355e500ad0c4eeddc390d8869ce567b3815e890567f3dc71797fd317e7c7aa5cc3007dc641f3a8dd3fe64ab555a3506a9bdf1d1755da9e29e2beae392954afb2bb4364f0d75fe0108d63b10b19399b184985b721c4bf8bec8f241a3fd1349a69ceaf7b49b"}}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000480)={{0x386, 0x8ac5}, 'port1\x00', 0x10, 0x0, 0x3f, 0x5, 0x1, 0x1, 0x666ffe6c, 0x0, 0x6, 0xff}) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000001c0)={0x8, 0x6, 0x2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000640)=0xe8) fstat(r3, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000840)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@multicast1}}, &(0x7f0000000940)=0xe8) fstat(r3, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000a00)=0x0, &(0x7f0000000a40), &(0x7f0000000a80)) getgroups(0x8, &(0x7f0000000ac0)=[0xffffffffffffffff, 0xee00, 0x0, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() write$FUSE_DIRENTPLUS(r3, &(0x7f0000000f40)=ANY=[@ANYBLOB="78030000000000000400000000000000030000000000000001000000000000000300000000000000810000000000000009000000080000000100000000000000fcffffffffffffff0100000000000000ff00000000000000f9ffffffffffffff04000000000000000100000000000000000000000200000004000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000008004000000000000000000000000000000020000000000000018000000030000002f6465762f696e66696e6962616e642f72646d615f636d00060000000000000000000000000000009e000000000000000d0e0000000000000300000004000000000000000000000001000080000000002000000000000000fffeffffffffffffd0000000000000000100000000000000000000000300000000800000000000001f000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0800000004000000000000000300000000000000090000000000000011000000070000002f6465762f7667615f61726269746572000000000000000002000000000000000000000000000000030000000000000006000000000000003f0000000400000001000000000000000800000000000000820d0000000000000500000000000000090000000000000003000000000000000000000040000000030000000000000009000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="02000000ffff0000000000000000000000000000be4200000000000011000000f8ffffff2f6465762f7667615f617262697465720000000000000000030000000000000000000000000000008000000000000000010400000000000004000000ffffffff0200000000000000020000000000000002000000000000000700000000000000ff030000000000000600000000000000710c00000500000005000000000400007f000000", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0100000003000000000000000300000000000000f4000000000000000a00000007000000106d696d655f7479706500000000000001000000000000000100000000000000c50b0000000000000500000000000000b20000000800000002000000000000001f00000000000000e9000000000000000000e0ff0000000009000000000000000400000000000000070000007f00000051000000000700000008000000", @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000000010000000000000100000000000000030000000000000011000000020000002f6465762f7667615f617262697465720000000000000000"], 0x378) 14:52:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'bond_slave_0\x00'}, 0x18) 14:52:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xffaf, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000d40)='}\x00N\x06\x94\xe2\xe0\xe3\xab\xe1\x03\x1e\xc8\x8a\x17\x88\';g\xdd\x04r\x0e\x8d\xff{+\a/\xd2\x93\xa7\xcc=6\x15.f\xf4\xa2\x93\x91d&\x17\xc7\x82\x89\xe8\x95\"\xa9W\xbd\x91\x96\xd7=]\x9e\xe6\xf1I\v\x91z\xfa\xeb\xd1\x81\xc2j\x10 v\x93\xc7\xc9+\xc7\x8ds\x8f\x15\x8aR\xc3j\x80\xc3H\xf3%\'4\x11\x85a\xc6\x96\xd0gf*P\xfa\x1aET\x01\x05Y\xcaY\xc01\xcf\xae\xb1\x9f{\xc0\x14F^\x8f\x8ej\xa17\x02\xdb\xd62\xdc\xadn\t\xa6z\xad\x9b\xbcf\x96\n\x81*\xcf0\x11\xaf\xbd\xd5\v\x1f\x10fuY\xc4\xd3\xf6\xc9\x88\x8b\xdbV8\xc67\x85\xe8\xdf^4Y\x9c\xdb^\xf9\xe3uv\xc9\xc6s\xde3E\x9c\fE\xd2\xce\xf5\x06\x95\x98\x17\xb0\x9eK\xfd_\x8e\x1a\x1fT~\xb9\xc0\x8b\x86\xe0h\xae\xce\xb4\x16\x0f\xd4XRr\xcb0{R\"\xf6}w\xc0\"\x06\x9f\xff@2M\x93\x90\xae\x1d1@G\"\xe2\xe4yn3:5\x81h\x91(\xb2\x13\xd6\xbe\xb2u.\xd4J\x9d\x1c\xd7\x8d+\v<]\xb0\xb6a\xe6A\x93\x1c\x98/\xdb\x11\xf7\xd9)\xe9?\xb8\xd1\xfe\x912\x8041\x82\x89\xad\x12v\x12\b%\xd1>\xb8\x99p\xd731\xae`!\xab3\nI\xfc\x03*\xc7\xd1x\xe6\xc3\xf4 d\xa4\xb0\xb2?\xf1\xd7\x81\xb7\xc2\x15\xbd\x8f\xf3\xa6;\br\f4\xfd\xce\x8b\x90\xf6\xf7\x95\xc7\x1f\xe2~\x14\xdf6+P\x10\xb5\x83,\xf6,\x82@b!\xb5N\xfd\xe0\xeek\xe3\x1a\rJjX\xbf\xef\x8czOT\xa5\x1cYt2L\x02\x1a.v\xd6\x01\x7fd\xf3*~\b,}\xc3m}\xf8\xe4\xec\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x9f\xeb;B\xbe\xa7\xd87Q@\f\x9b\x15\xf5\xc8W\xa7\xf1\xb9#\xde\xc5\xcb\x17\x12\xa5%W\xc1\xfaa<\xd4\x93\x96\x8ed&\xac[@\xfc\xec6s\vZ\x85-\xe5\x8b\xd3mr\x9e\xac\x81qo7t\xc8\xfe\x8d\x9b\x98\xfc\n\xbdv\x14\xb1Y\f\x9fF\x90s\xda\xe7=\x9e6v\'\xda[\xdd\xd1\x9dj\xf4Ft\x8d\xf1\x03\x02\x04Ks<\x93\xf7\x95\xbd\x0f\x97\x11k\x1a_\x8dp6a[ol\x8d\xf7B(2\xab\x1e{\xd9=\v7\xea\xe5\xe8\xed\n\xe1\x83\x88R2', 0x0) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00002e4000)='./file\xff\xff', &(0x7f0000000000)=ANY=[], &(0x7f0000001ffc), 0x1400) 14:52:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:50 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xffffff7f00000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1989.923028][T22919] IPVS: sync thread started: state = MASTER, mcast_ifn = bond_slave_0, syncid = 0, id = 0 14:52:50 executing program 2: symlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='./file2\x00') clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000a00)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file2\x00', 0x0, 0x0) io_setup(0x200, &(0x7f0000000280)=0x0) io_destroy(r2) 14:52:50 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x4000, 0x0) fgetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792e2f6465762f696e6674c650f2e4953dc01fe722f4616e642f72646d615f636d00"], &(0x7f0000000200)=""/130, 0x82) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 1990.004080][T22988] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:50 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r1, &(0x7f0000000080)=@random={'osx.', './cgroup.cpu\x00'}) [ 1990.075541][T22988] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80100) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:50 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0xffffffff00000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x8000001) r2 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x480000) setsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f00000005c0)="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", 0x1000) shutdown(r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) chdir(&(0x7f0000000200)='./file0\x00') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0xd4) sendto$inet(r5, &(0x7f0000000340)="8f20a5c0178209f43a199aff90480b61", 0xffffffffffffff4a, 0x11, &(0x7f0000000300)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x2000005, 0x0, @loopback, 0x700b}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r3, 0x7}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) bind$llc(r4, &(0x7f00000015c0)={0x1a, 0x31e, 0x400, 0x5, 0x5c3f, 0x15d}, 0x10) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x5, 0x101000) write$capi20_data(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="10000100418307000500000000000000fd0020f6001d5e0b8f5abe3916ccf0ef14e685979d5fedc6b4da54b00720d67a875d5a7ab928679458e626d91fd2111528f1d4ee1501836e4f2e88e429dea267d1c417fa7d09a9f2968d420a8786c0d71c53601090bd804da18db586c608ec7da29419cd8885ed19ec87af846541feeb09f40f9e44058dd26b3f33116ee7770000000d71e41c0e033695d6f63e35dee5aa4e5ec9b320af32e6e8bd64beef439bf957046a16a12f071c215720ec0b513297f4e8cc540a08885961e306a33bd1980033352f42ac922517e0e19ea6cdf858b886a46e75fb55bd300000000000000008e19d9a3563f1c8f83b71e106c982c24e38b419fd7268bd2f0e986708a67d"], 0x10f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0xfffffdc6, 0xfa00, {r6}}, 0xfffffffffffffdc5) ioctl$EVIOCGREP(r5, 0x80084503, &(0x7f0000000500)=""/173) fsetxattr$security_selinux(r5, &(0x7f0000001600)='security.selinux\x00', &(0x7f0000001640)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x2) sched_getparam(0x0, &(0x7f0000000240)) 14:52:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) capset(&(0x7f0000000100)={0x20080522, r0}, 0x0) 14:52:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000200001000000800000000000020000000000000000000000040000001420110076657468300000000000000000000000"], 0x1}}, 0x0) 14:52:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1990.366670][T23445] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:50 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='oom_score\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 1990.429489][T23445] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0xffffffffffffff6b, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:50 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x2}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x24, 0x3, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@typed={0xc, 0x1, @ipv4=@multicast2}]}]}, 0x24}}, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) msgget$private(0x0, 0x0) getresuid(0x0, 0x0, &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000400)) 14:52:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3}) 14:52:50 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8, 0x181000) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000180)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 1990.708703][T24065] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1990.728090][T24101] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x89e8, &(0x7f00000000c0)={@ipv4={[], [], @initdev}, @local, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}) 14:52:51 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x4}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1990.778555][T24024] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:51 executing program 4: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r1, &(0x7f0000000200), 0x44000) ioctl(0xffffffffffffffff, 0x0, 0x0) 14:52:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0xfffffe96, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x142, 0x9}}, 0x1f) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) pread64(r0, &(0x7f00000001c0)=""/217, 0xd9, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1991.041869][T24481] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:51 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x5}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1991.084105][T24563] binder: 24489:24563 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 1991.122135][T24481] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000480)=""/204, &(0x7f00000003c0)=0xcc) setsockopt(r4, 0x10d, 0x8000000003, 0x0, 0x0) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000000300)={0x9, {{0xa, 0x4e24, 0x9, @loopback, 0x7ff}}}, 0x88) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x4, 0xffffffff, 0x8, 0x0, 0x1f}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000140)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:51 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x8}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1991.336761][T24984] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1991.349771][T24987] binder: 24969:24987 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 1991.391133][T24990] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1991.410630][T24993] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) 14:52:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7d5, 0x10400) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) 14:52:51 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x10}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1991.591340][T25305] binder: 25289:25305 BC_REQUEST_DEATH_NOTIFICATION death notification already set 14:52:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x80000000, 0x40000) write$P9_RWRITE(r2, &(0x7f0000000140)={0xb, 0x77, 0x2, 0x7}, 0xb) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0xfffffffffffffea1, 0xfa00, {{0xa, 0x4e22, 0x0, @loopback, 0x3}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 14:52:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x89e8, &(0x7f00000000c0)={@ipv4={[], [], @initdev}, @local, @rand_addr="98e8775c98c3f1468f46c28f7bef57f9"}) 14:52:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) [ 1991.711330][T25313] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:52 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x30}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:52 executing program 4: [ 1991.827312][T25401] binder: 25386:25401 BC_REQUEST_DEATH_NOTIFICATION death notification already set 14:52:52 executing program 4: 14:52:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0x9}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r3}}, 0x48) 14:52:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:52 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x8, 0x800) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000200)={0x0, 0x7ff}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r1, 0x408, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x29}}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x4) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000140)=""/47) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0xffffffffffffffc1, 0xfa00, {r2}}, 0x10) 14:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:52 executing program 4: 14:52:52 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x78}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1992.079712][T25732] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:52 executing program 4: [ 1992.176533][T25732] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:52 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80000, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f0000000200)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004fcff", 0x58}], 0x1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r3}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) fsetxattr$security_smack_entry(r0, &(0x7f0000000280)='security.SMACK64IPOUT\x00', &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x18, 0x2) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) connect$unix(0xffffffffffffffff, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) 14:52:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x301400) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) write$P9_RGETLOCK(r0, &(0x7f0000000200)={0x36, 0x37, 0x1, {0x0, 0x79d2752e, 0x8, r1, 0x18, '/dev/infiniband/rdma_cm\x00'}}, 0x36) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x3, {0xf16, 0x3, "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", 0x4c, 0x7, 0x5, 0x8, 0x1, 0xfffffffffffffffa, 0x1ff, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000640)={0x0, 0x3}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000006c0)={r7, @in={{0x2, 0x4e24, @local}}, 0x7ff, 0x4}, &(0x7f0000000780)=0x90) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f00000007c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r6, @ANYBLOB="000427bd7000ffdbdf250c00000008000500fdffffff08000400800000001c00030008000500e0000002080004000500000008000800010000000800050005000000080004003f0000003000020008000900000000000000000000000008000b000a000000080006000800000008000400f30d0000cd3ae6289f17ff4abc4295a9873eacb807"], 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000805) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r5, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r5}}, 0x48) 14:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:52 executing program 4: 14:52:52 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x408}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) [ 1992.479082][T26196] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e22, 0x81, @mcast1, 0x8000}}}, 0x90) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00042bbd7000ffdbdf150c1e000008240000000001000c000100080008005dd3e9abf828cb0a06000000"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40048c0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x1, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000200)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x3f, 0xfa00, {r3}}, 0x10) 14:52:52 executing program 4: [ 1992.537796][T26196] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:52 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x500}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:52 executing program 4: 14:52:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x7, 0x8200) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x1000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e23, 0x7fffffff, @dev={0xfe, 0x80, [], 0x1b}, 0x3}}, [0x7fff, 0x4, 0x1e, 0x8001, 0x6, 0x0, 0x400, 0x2, 0x101, 0x1518ba29, 0x1, 0x4, 0x2, 0x9684, 0x100000000]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYBLOB="3ab81d2dccc4815403003f0008000800040007000010d341"], 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 14:52:53 executing program 4: [ 1992.782993][T26520] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000001c0)=[{0xd, 0x0, [0xffffffff, 0x1f, 0x1, 0x6ac8000, 0x8, 0x8000, 0x4, 0x6, 0x2, 0x7, 0x100, 0x359523ce, 0x4, 0xfffffffffffffff9, 0x0, 0x1ff]}, {0x24, 0x0, [0xffffffffffff6498, 0x8, 0x8, 0x3ff, 0x5, 0x0, 0x200, 0x2, 0x394caf74, 0x8, 0x3, 0x1, 0x75, 0x2, 0xfffffffffffffffd, 0x4]}], r1, 0x1, 0x1, 0x90}}, 0x20) [ 1992.859540][T26520] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:53 executing program 4: 14:52:53 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x804}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000180)={0x200, 0x401}) [ 1993.085881][T26843] binder: 26816:26843 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 14:52:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = gettid() r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8cf, 0x2000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000200)='#eth0.GPL],em1-selinuxvmnet0[cpuset\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r3, 0x0, 0x18, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', r4}, 0x30) 14:52:53 executing program 4: 14:52:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) [ 1993.140463][T26936] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1993.206447][T26936] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:53 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x3000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:53 executing program 4: [ 1993.308070][T27079] binder: 27078:27079 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 14:52:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001640)='/dev/snapshot\x00', 0xfffffffffffffffe, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x0, 0x80001) write$P9_RXATTRCREATE(r3, &(0x7f0000000280)={0x7}, 0x7) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x3d4, 0xfa00, {0x1, &(0x7f0000000440), 0x106, 0x9}}, 0x20) clock_gettime(0x0, &(0x7f0000001580)={0x0, 0x0}) mq_timedsend(r0, &(0x7f00000014c0)="ee60ec82b8fd1f330e49a2b144703ae87843094cbf0deea9b08ff0c791dbbdf37a8e80af9406437dc6c95dcb3ce1490559265ce232ed656febceb2178a0af165a830924979fef4c001b30e34fb306407c7631cbb1f6c7ccd3233a07bca6b4b5044af289f1a729f8397ff1e7b01d77a9a6c9b1f6414dad37437a45297fec558e10174", 0x82, 0x4, &(0x7f00000015c0)={r7, r8+30000000}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r9}}, 0x48) uselib(&(0x7f0000001480)='./file0\x00') connect$inet6(r4, &(0x7f0000000400)={0xa, 0x4e20, 0x9, @mcast1, 0x5}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r11 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20c0, 0x0) bind$nfc_llcp(r11, &(0x7f0000000240)={0x27, 0x1, 0x0, 0x7, 0x0, 0x200, "9872c8fe2d7f90e0492545ac5f2dbe377b0c0c2a6a2e27bed8a11903bc4cc3e4716a13ce323a27e72d8ea43d448776fb180b4be29a5a899cef66243efdf723", 0x28}, 0x60) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r10}}, 0x10) mq_notify(r11, &(0x7f00000003c0)={0x0, 0x6, 0x6, @thr={&(0x7f0000000480)="3072f27f28b6d34a045096705d10defc760cf007d7992d1d38d52004f6b554e229b581decf2ade140afe7052ff581cbe64781f2f1260ef6128b63f7487b7204c32c6880921c9858e2ed8c46fea8d6d9bc3d4e08811814fb8802b5f33043149997d05e86f7565f7fde4f652db517d090f2619531b64f02c8f6ffd0939cde00d8e72f47e5e645b24f435b1629f4703edddc32c78f2388db72ea9f9532bcaf30ab2ce03827b76b3825da72b33f7b77758de9c8174ce9df9d56d5de9ff192200d2ca569e80810c12436b565405496d950fb35b5e032ac0d2377459c508dcbe89d2aeb3414f0887a6ec00fc9139c6ab299f5f0ca5a5a0327f201841fa88ecf8c72c27d1e4577b05022b091625f15e1b60d7168ca4dcc93fd9ef07c8c13176468b9d64d6c47660f9695e69645c119aea2f0e39344c6d96b5ceb6e70a0269147d96d96eec17b5b832b9dd8b7a3b9aa57d9216dace0ab45832bf8b50ec205588ed0f765b13cdeaa076bd005894d193260c58b8c6573914bf35970746ddac8a1ef12bfd628e203030c9225d004730fd87a52475659f6c72e339e39b21aa745d2abb65beb92379ffe1199cc70ea41e0b68ffa52ed4f48ded99d0d209043515744b3ff3d217c74b8ef69e21876f61666edb70004b64b1048aac34b624a93a83ed212863605116969f6090d0ec88194cffe372dbc787ea03cb1be6a6503d996f5a38f42ab980a931eb52ff5f3e57944e07b25627eeeb0073fe5b3852c6107b8039c0915688be441a491a0dc650ea1fd30d1410a0153a533de9b45ef18d0fc917609fea0991f3c2e235906113250d7fb6e7d54b1cf66f3fa229dc2398e350a9e59406a0fd1f464cc08adc0f050990a18391b299cc0bed6704d4c239a4db382eb4d58adc603ae27cd918e3e913ac12444efe89770dea61dbae4f4290b88486b686a4853fc570a72b287594acbe71c9fa6ee348b82900828d030111636854483904510f99483facd9ddfc63fec8d0eefa88f0c5c94903f8311b66f2e6cbb0f76c6aa03cbc7d8ebe583063ef0859aa595a9c2235241640247d8e89d8ee47ff95816d78cad67d8e968b6c7f42cf6804f768cc6612af4c0956021e00884cd5cd9c4193672ab329f1458981f40a6d7bbd1c6481caa756a109e31d474409ec453aaab028afcb9ee24fc97ca246705b4af289a002de0cc989699e9968826810812c670708a3e09d7744c854961e2fdf4ea2f9759b44b0667713abeb2989c9b5fe0dd251d2fad73e3730e2b2de65ce2c970e4095404fc0baea996f2eea6fcdb1a0fab615ad627b20507cd779906682fb6e44fec2502c2218559f3eb2df81a854380f5eea4ff7d1572f84144f78a378ce63c1e919cd2a5e68520f96e6ee9c31fa050eae9a84a7e2f1c6ab9218614c301544ccf8276af2456031e32d2acb149cd2a47b55ceb7c7de9ae3cf649d7d70a374b655a3b38cd577700451822378054f15d86d390ddc17a6068164d1a190159faad4442f02b06fd82afe8da34a142e29c09224f79f52a2f30ab6f31f7abda8d4dad8cd54f6af0c22a7656a39cc48be2c16ab888bf8fb3bd237830a12d085bb82c84ed9c0b60fbafa078c63443b53f25681a55e1d7aaf5bd606ee3657c63443978f05e82ca55ee70b785472831f9b92c4bfb9a6d758f5e039c94bde5c51647ad1e1d7ad7a6dfc83ad9817bfbb7aa26d891adfbeede45656cc1f379cecfe3cbc90ad5ec9b0e17b02919e621dec18243bdd1caa9cef9def5707bea2348b70fed28645a61753fd990e1ef0dc28864067a4dce999ca827eccf0320ad1d90e56a05fc05a436d75c3b2ff80089b655d679f8ed40bc9fe8fa8059c6fbfafb02b6020dc0318e5c667c2fea2e0ef097a95ed0883fb6b5accb199a3ed2b56b9bde5d3ad0437836bec7e94c287c7094bda70ae0395961cd96e4fc16e7ae29f36fbf5a64b8a8d951aa3f0585f0dea1e41d90c31d10e085896ea1b541e396d23f9d1ecc6305d60d13fc2c39e4556b1770fd1539f0b3e30ddcaaf9855552a85eec71dee26650bee0eb24347da3602a9c332ea77c5d4cd8a530d3eb58210dd2125dcdf145298d14cd8bcd934882907bd4432e388168805718ebb301b83dc5340c8ce45cfca7ef367742aea3130edaf11f158126375dfcc84263f5d2c015f152e6e6cb3a216a7e99f4b2d988cd2aaef0888aa0f8beed748b4f969a258c5bb8457b08cafb5d60b185d37cdb2175cd36304c1ce459619fc51d609269461ec69e093a79a9b92f63938983f3752f31c8ce84e5d39e7e7b1e749d7dbfec1ba365ca121aad8af78ed1ea70a4d727d22dc97e5eae7f1b91f6eab9b9f660254b0cd6f06136c83137a9c4670b8dc9dc5edcbc3f6646cb19c1b01f45a1ef2f5366215403861686a2f4c1147df1809ab1ea6486177d2ea5801ea37e592229a963d3c431509392ccd45bafc815795d92ccef4c43d0ae5ad88211b6744ee53f236d953e3e4ff0dac7a8aaabd5920957777e8d6796ae7cb943a52646a5d42b2211b0242271026795dd0b564c8efb1ad5bd4baca29840dad452e282e458431047f091a7ce329770e4025970ec7ab67f612c31a83d3c74c22bacd78c8d911e93507d4bd5006b4da22a7f55ab695ec82967d217991fafb88d170cf21dcfa9a1621320ab9d1c00dbff21f36483d8711a8a41b4974856d36dda9bc103617187cf2b3d34b0125287806a599981c193f4aafb3852c6a16ae6f4ff51de61800821f42dc12a84e5f91b9ef4d1d29966fc9052cdd8adf74cb249c0741ac43dbdd50a6defcf277fae014c2441708e64ea735c273273c3d87959c5000287b06da768b0a89af2bc4482212feaa2ede7e75e74cc5a5c092b4fa78983a96771d7ece29b5fb89fd5f270f3d2ba4f0d593b22979c9764c51646563dc7929bae9ab48477b38957904bb99893cda07a6338a25427ac617d009c1583ea3a5eae7bb4124adad96cd1cf5b142de9d60270715f1ff9c4346cc795d5ff105ed3db6c6cc7bb959d0956270a9d6da4e7bf10f2af73d24713884e43a614eca968c7baf15479d2ec13714cfc5a20dbda13940f18d8d366cc50c2330d92a8086635df88b7dc874df2f36159121b8d91a8d57808f03f790b9790f3abbb88113659c6bec79074c870410485712dc07dc4b99ab28c6beb21a5cbbc9fcf7b02b6e6f9ad677faac2b08c105bc53d062d92a91ee5405a2646dab8e8076bdfcc3654cf1b114e5096217df7a9a76dca6e498b5c9160fb8d09cfee24ccadf71941493a97ecd589fa376da2e959c605f5b98e6e8a2a1a6f18263e7b7f10344fc902b52318a8e4e79e5ed53bbab41aabfb56ac3409aab2187a5f89335cbce6a06b662946d9918580847f29c50436307a1897f9a7962342dfe642f239c311e21c0460fcb7d90a47700febd6f256652b6bcb5e9ba6b69477ab6f3be566c343c89e27bc5d765274075008d13475aaf359f1e0c65e0ff3dd66a11d2ae24bece95c42298289ed953ab8852096073c6b29674aa51ddea8ccd365d79ab6c2682d041985900b6f75151d006e105707bc25074d445efaa84776f94c24f7e9f46c425db45070284e80695a89dc455988153c38f0396ffd8d60e9b5043cdd4577f4076ea647c08846f772a953bacc0124941be291a864f91060aa35ee21ae4ba7fc17c3cd123d283d5236f383ef7f2aadfed91688e4f853f571679ada04c2413cbd131938e6f6575fc773a13445c1d1d151104f5836590b4c2bb7cd644fcf81d864e79bd2c7eeddae4ffdc3ead56b84edb6ce4ac56b63a4bcb6407cd7f7fa631479568e018ce8dbfaa12a90ced649eaeff7a1ae2d356ff71761a43c5a19c08a30446f7f27c6c976ac5d2052b1420d89f2ade179f2b269242ff7927ce9d977c009e9738ea1a58e5b22bb4235ab20d8ef30a55440856671ea2c4b4f28a11f76f93a6e8885d98041f192a0adacd8c4ecc461325f35bf0d628ba5d0294ec282cc74c293acdd3c9bf4e81ec3bab073cbcd421de8451be4276591061ba11d5bd026b732ca5fd872511367aff75a57ad5dcc710c241c6398fa285acad6612c43de15b5f556d6e08258b12eb8c48c88d92aaae3bf3466ca8703553fd2bc68e4acb15f81cff61dbe466177a235d4089d576e773d34b1bebda1c8816d3c287a183302fba9f05cd6f28a9e6e28d7c56f35647656cf9edf3d712a0cd3850ff45becb94925c31e4cb4884e889b993de10329bcde88fa5f348aaff9305ec32e3270732297850fb3b5bfc385f72365ec0901e9fce9c55ec2604e9efa6cf429f1d95fc9d10a5cbe45f3e92ceebd22df508ecf5688b9f0bb6ee551d277ca46a001968e144df5ffdf104e2bbb87e89ffc794b1ae1c3f328d3a13dbd0417d1a9c390db9720880e728faa4afc6ea17422d5061b28b18b6c372e7357d1ad1cd15bbbaf26f0967ca547c0ed4e71c0c4192266db3420eaf889279dcb319fc719f2463e8f927990b5a67012e7c6931d02478bac274555bcaf78c27415dbe8bf66ab5a9802e019e6bef5ba1f294c858bdfdef0bebf732bfe07a22da998d9735fe782e2639a4f50393a26b7838cb1f876582054235c83a580327b1b07243e9c0cbea793e7b4f5be77798c50515f36d05d77e81dfd032c066b489e2c62b681f0853ef99bd02c3c85d9d1f74cd9d828fe502bd348eecb1c7a2e902ae54cb5e79206524ea43a40f4cb1960494420ffde5479994130e30d31e93f564b7fe27cf1b81e6df11ccfe41bb804bb4bc322cd14bc5eb9a62cdc8ee301325150fda3250e9b71c5235e5f205543d9d10265618cfbedab2d6ed2ee5c5cc3c96b6969a9033c8430de36a4c846f472f37dc4fdea21780ecc631eea64f24a42fd5c82f89e0b2ce2773477d891b7d852a18cc63ff53e75a45b107a030a8f6d37c7448b76b64335a02e85f829cb85209f6fcc1d5813007fba05b898a19b2826c82963e51a76c7f37c7f79bd6036dfb5784231820cdafd31fcd27e3649d9bbbd8305d5e0b985131de47225f9454a257d44396e44382ccf8d748b13ad1263958b61ea4028b6ebb9159a286cff6848e317092367b5fe03996a7fe09efde7e22b442e87e7f93393658a8e5db9e8046f258da50bc6eb5b33a82cc53e058156f8c8e5f5b4fe709a95930ba3b6cbadc01eb5deace23cbe0f33a71e2b7a2ee7f2beedefbbcc93c1bdc446dede5565640ed474ea6111bf6b3879e72ee80c197e232e0361e636e696989f17de8c26ae1cd27b30997acafbdf12a2d8f79b83fb675ceeace099ee1dc3e4a35d0012b13c6c25b2217003b46c8c5c5404b5067437a86f04ffb60b87e8e3bb2354a036d3f80ed7313da1b78ddfe3f7f23d5b008ec70559977c356217cb03f622b6d5f1537dd8ce5cc9c5a4420b800fe2c1a8a9b45126b804cd417b4bdb9bfdd0f632ed5c0e0600bca2e5c4ac0107bc439da18bf248b122b4dc88973bae72cd124225772e8832d59cd7d9bb9804485a92da35e7f635c7e5078b2be8fd99e34e01b5a8b20427a15183254ebfc7ac3b5a72be816bcf9a049c8b3b2ffd3d0d21fac52b49247dc8d32243b3a8f92c05e7f2bda2ab587796a6570c166e19b76d3f5da57baf4d55fd363e0739cb669182a9c955b3d43d35dccaf9616e41cbcc2be98247a1647960a749b68d43e0ca7ae0732571af3abb40101f5a820ef5497f2dc6355f9088f5d4aaec60b5f962a9794ce6dddc9b536ca9e2d263d98b709f1410d871f32f1fd24506af97017fdee6feedfb0934986b3111dd80d35dca018cf8dd7246432871c72fbc8ae23d355ca1376923bf0e40a04895e4b", &(0x7f00000002c0)="37b1f28811b7e84371a20f5afa8e8026a44dad8bdab5dba543ef7f554d21c915a6aef9178cddd6db0ceb80def8b120a84df554741d2000d9f2a23c5a14a14e71e87290ff06317138858a9c8cef25d7f92345364f30b35842f9b29c37ba0c55d87d230e115497b58382109125fab158c89bb69e0a2b862f5d240dd52d7542ef6fd2f8055122d3f5c61578af8e39"}}) 14:52:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:53 executing program 4: 14:52:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x3866) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x801, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0xbb, "4ea977ef5ab0341c23fd7a906bfee38d5d682e407be7c31ca345adaf00ec452059a663141df7e73aac571d070ae8bccf5d5630aa73e76baa01eb392944c045911c8178b40552eb9381d29ffb277db44f6c37be37a994485c140d83c01d54bcb32d926351815203387bc6e76c17e8d1460fa7f376d6c4d88302e7ac489144256024b04e623cbfb3673100468ae4b3e8c720222f936933a3afdcf9580b51d7efd414b483d9393a8fad10b01b575666b67f1096f63bd0ddcf7bf80d48"}, &(0x7f00000002c0)=0xc3) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x490000) ioctl$sock_ifreq(r2, 0x894a, &(0x7f0000000380)={'veth1\x00', @ifru_map={0x42, 0x6, 0x3, 0x6, 0x40, 0x7}}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000300)={r3, 0x20, 0x0, 0x1c0, 0xfffffffffffffff7}, &(0x7f0000000340)=0x18) setsockopt$inet6_udp_int(r2, 0x11, 0x6f, &(0x7f0000000400)=0x20, 0x4) write$binfmt_aout(r2, &(0x7f0000000480)={{0x107, 0x0, 0x7, 0x93, 0x9d, 0x9, 0x341, 0x40000000}, "6bdfb93032cd145cef6bf3ee413c770c229f7850f7b69d85779b33ef6ba6cea355564ec22d073115fe7f15a62d0a76bc1419b6968c38a13b9096b266b68912ebec8cae041672043e23c9372842bdc44181c3cd59094abc519718effc1986178cb2b7e0f6841986c0557acce11f529460425637138e933ebde9ca0113db1b68092c887d19d1a5ea7422b7", [[], [], []]}, 0x24a) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1993.452669][T27243] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1993.539252][T27243] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:53 executing program 4: 14:52:53 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x7800}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1993.609423][T27452] binder: 27344:27452 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 14:52:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x80040, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:53 executing program 4: [ 1993.757681][T27574] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@md5={0x1, "3f07c3699ab38103cbacbaa86b4e6a70"}, 0x11, 0x3) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x101080, 0x7) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000380)) r3 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000280)={0x65, {{0xa, 0x4e24, 0x401, @rand_addr="4f0d1b3ffbab87c286130b18c1a65e92", 0x3f60}}}, 0x88) [ 1993.810131][T27647] binder: 27627:27647 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 1993.814064][T27574] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:54 executing program 4: 14:52:54 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x8008}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r1, 0x100000000}}, 0x10) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200000, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0x98e9) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:54 executing program 4: [ 1994.020464][T27892] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:54 executing program 4: [ 1994.096098][T28091] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x402100, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000240)={'team_slave_0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}) 14:52:54 executing program 4: 14:52:54 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0xff0f}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1994.193659][T28214] binder: 28202:28214 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 1994.219044][T28214] binder: 28202:28214 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 14:52:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x6, 0xfa00, {0x40000000000, &(0x7f0000000380)={0xffffffffffffffff}, 0x13c}}, 0xffffffffffffff74) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clock_adjtime(0x0, 0x0) 14:52:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x100000, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) [ 1994.426448][T28373] binder: 28359:28373 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 1994.464479][T28373] binder: 28359:28373 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 14:52:54 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000002c0)=0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r3, 0x0, 0x2, 0x4}}, 0x20) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e22, 0x3, @local, 0x7}, {0xa, 0x4e21, 0xe4e, @empty, 0x2}, 0x2, [0x8001, 0x44, 0xffffffff, 0x0, 0x1, 0x8, 0x6ac953be, 0x100]}, 0x5c) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r3}}, 0x48) sched_yield() [ 1994.493025][T28490] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:54 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x11eff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0xfffffcf4, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0xfffffffffffffc60) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x40000}}, 0x20) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:54 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x100000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x4f80, 0x8100) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040), 0xffffffffffffff5b) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1994.845749][T28864] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:55 executing program 4: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x21) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x0) 14:52:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x2, 0x0) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000180), 0x2) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1994.893334][T28864] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:55 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x1000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x48003feacf62b72f, 0xfa00, @ib_path={&(0x7f00000001c0)=[{0x8, 0x0, [0x1, 0x7, 0x6, 0x7, 0x9, 0xb7, 0x3, 0x938, 0x81, 0x8, 0x6, 0x2, 0x9, 0x1, 0x2]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x0, 0x100f}}, 0x20) 14:52:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x24000, 0x0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000180)={0x2, {0x8001, 0x1, 0x7ff, 0x100}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x200, 0xffffffff, 0xf4, 0x100, 0x800, 0xffffffffffff1057, 0xfe, 0x9, 0x34db, 0x101, 0xffff, 0xf5e8, 0x0, 0x400, 0x0, 0x8], 0x100000, 0xc0000}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 1995.193239][T29225] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1995.252498][T29225] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1995.263886][T29293] binder: 29260:29293 Acquire 1 refcount change on invalid ref 0 ret -22 [ 1995.279441][T29293] binder: 29260:29293 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 14:52:55 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x2000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1995.312664][T29293] binder: 29260:29293 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 14:52:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) [ 1995.446637][T29486] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1995.470084][T29489] binder: 29488:29489 Acquire 1 refcount change on invalid ref 0 ret -22 14:52:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = dup2(r0, r0) sendmsg$kcm(r1, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=[{0x10}], 0x24}, 0x0) 14:52:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x80000000000000, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x4, 0x6, "966f379c869feb11bd43ea40f5b71a1830a015b443587eec2dc44b3dd9550f077c97c3dc067f7ba967ad587f975483f45db92c3cddb42d7343a0c87da2a66935240a8a46727fba8532c8347250298f7a87f98cb12ba868bf3d80ab94e9d9b66719cdd2d1cc8ebae087bb055f381ad173dba76a20ba7c77b4c9d3d74b052086b898dfcf7bc91ecafdc5e9b4f0465a296a9900db1921745a6fe9c195aa935f9b4c9d1b9ec2eb8fe1bc2abc12d7e4f7f6e379cc6c171e6d369832f27888f0f933f888c90c7e833f592831013b8c4b2fe4ae5042b2b367c1581dbd003baf606c1bf65cb9e4462ebe256ea1de6168e0bc6778e863b5bb24929a1d8cbfd4df179812eb", 0x7f, 0x9, 0x24, 0x5, 0x0, 0x1, 0x8, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1995.512063][T29486] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:55 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x4000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000040)=0xd2, 0x4000000000000, 0x2) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}}}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10180, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4, 0x1c, 0x7, {"3231c93c"}}, {0x0, "95f27cf717c4a30aa561ae5214d2946e62794bd75c88"}}, &(0x7f0000001300)=""/242, 0x34, 0xf2, 0x1}, 0x20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000001c0)={0x94, 0x1, 'client0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x4, "6d792043befc35fb", "642c450cdb22749d819e32bcc909941e4c00", 0x80000000, 0x9}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000001440)={{0x1, @broadcast, 0x4e24, 0x4, 'wrr\x00', 0x2, 0x3e, 0x74}, {@multicast2, 0x4e21, 0x2000, 0x0, 0x0, 0x9}}, 0x44) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 14:52:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) clock_adjtime(0x4, &(0x7f0000000200)={0x5, 0xff, 0x20, 0x2, 0x8, 0xbdbe9c, 0x6, 0x2, 0x9, 0x9, 0x6, 0x7, 0x276b, 0x2, 0x3, 0xffffffffffff0001, 0xfe32, 0x3, 0x7, 0xef, 0x6, 0x5, 0x5, 0x40}) 14:52:56 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x89e7, &(0x7f00000000c0)={@ipv4={[], [], @initdev}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfdfdffff00000000]}, @initdev}) [ 1995.782527][T29966] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1995.848377][T29966] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:56 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x5000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x200001d0) [ 1996.095654][T30167] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x117, 0x2}}, 0x20) 14:52:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) socketpair(0x0, 0x800, 0x40, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000280)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={'nr', 0x0}, 0x8, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, 0x1, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) [ 1996.147457][T30439] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:56 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x8000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:56 executing program 4: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x800000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 1996.431942][T30729] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x40000000, 0x1, @loopback}, {0xa, 0xffffffffffffffff, 0xfffffffffffffffe, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x154) 14:52:56 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x8040000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:56 executing program 4: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x200000000000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1996.529120][T30729] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) [ 1996.746745][T31073] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1996.783632][T31073] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:57 executing program 4 (fault-call:6 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x10002, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000200)={0xfa6c, 0x7, 0x4, 0x6, 0x712, 0x6b}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r4, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @dev}, 0x0, {0x2, 0x0, @multicast1}, 'bcsf0\x00'}) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:57 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x8282) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000300)={0x2, 0x9, 0x6, 0x100}, 0x8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x44000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240), 0x13f, 0x1005}}, 0x20) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000001c0)={'ah\x00'}, &(0x7f0000000200)=0x1e) [ 1996.810647][T31130] binder: 31120:31130 BC_REQUEST_DEATH_NOTIFICATION death notification already set 14:52:57 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x8800000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180), &(0x7f0000000200)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.current\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x17}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 1997.055450][T31323] binder: 31261:31323 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 1997.074976][T31372] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:57 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x10000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() 14:52:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xc5, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13b}}, 0xffffffffffffffb2) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @ipv4}, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, r2}}, 0x48) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.current\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000480)={0x1, 0x1}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000200)={0x9, &(0x7f0000000280)=[{0x8000, 0xd0, 0xd506, 0x3}, {0x9, 0x7, 0x3, 0x5}, {0x400, 0x0, 0x0, 0x6}, {0xffffffff, 0x200, 0x6, 0x1}, {0x6, 0x9, 0xf50b, 0x80000001}, {0xff, 0x2, 0x5, 0x7}, {0x100001, 0x6, 0x80000000, 0x7}, {0x5, 0xe2da, 0x7f}, {0x525, 0x287, 0x4, 0x4}]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x117}}, 0x20) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000004c0)={0x0, @speck128}) 14:52:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) [ 1997.145460][T31372] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x183442, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffc6e, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x20000000001}}, 0xffffff5d) r2 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000200)=""/160) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x8, 0xe2, 0x2}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:57 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) [ 1997.275201][T31516] binder: 31509:31516 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 1997.275683][ T26] audit: type=1326 audit(1550155977.457:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31513 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0x0 14:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000180)={@local, @empty, @initdev}, &(0x7f0000000200)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 14:52:57 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x30000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1997.456619][T31741] binder: 31727:31741 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 1997.487747][T31733] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0xa00, 0x0) write$capi20_data(r2, &(0x7f00000001c0)={{0x10, 0x379, 0x82, 0x83, 0x8, 0xfffffffffffff9c2}}, 0x12) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000200)=0x6, 0x4) [ 1997.509447][T31733] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:57 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000200)={{0x0, 0x3, 0xffff, 0x2, 0x6}, 0x80, 0x2183, 0x100000001}) prctl$PR_CAPBSET_READ(0x17, 0x1f) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 1997.665246][T31947] binder: 31917:31947 BC_REQUEST_DEATH_NOTIFICATION death notification already set 14:52:57 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x78000000}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1997.739340][T32025] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1997.801487][T32025] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 14:52:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) r5 = gettid() fcntl$getownex(r0, 0x10, &(0x7f0000000780)={0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) sendmsg$netlink(r3, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="24007000ffdbdf2514006f00fe8000000000000000000000000000aa00aa560000000000"], 0x24}, {&(0x7f0000000480)={0x20c, 0x27, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x18c, 0x8a, [@generic="372219385cec22527b07e1565f1b0e93a8f3ea10f13623d3cc087ec94633848bb469172bc693e6417302927a63c6818de0bf08cd2779bb3755c62fca5f3142a4bbfd9ccbf3e7835abc49b8f7742a3bdfce8164ba64d42be4960e628117ae4655657ddbf85db48b3837cb0843bdee9f5abd1edd1e94ea777b33f96937518fce6909fad5cc1ce4ca2c8c8974fc203ef9f9d87b62433a4bdeb50f0249ff955b6a0edd44d5c8a3aaad0cab28872da40614d991cf83c0681314218a5d50e39850eb6e8bcb6f000ad393552be3b9f73ab38ba98387ad47e36e351ca0521d03164fffaa873f6ce402f575c07b8512714c0abd65731c", @generic="94ff809fc20bbe2d54733e983249dd688739781ad73e54417e9884d4b350935cd194c6eb842b89395743ae4a9e4088e71f22d93e26b64f43a57744f6c2dd3c9b6fe1075214666f7a1a6e4e550334d25485b0bca9bbeb4686deb41d5e4e80ef718ae17800754f81384385d99e396bd4e60a8b5114c5c587345956f948c9c9477d5424a228243d6393", @typed={0xc, 0x86, @u64=0x9}]}, @typed={0x8, 0x33, @uid=r4}, @generic="2f371e82ae08c876e15ecffc5bbda2c858a31eae385fd8f7fbcee23c3f53943766e5a62de062de70fab3e4a0da9cbf77e30f86b348ff78afc84aa8a5ad12a2fb5c6dd19b85f890e0d9e6d608b603c2", @typed={0x8, 0x8c, @fd=r0}, @generic="ba6af3f87e23a549", @typed={0x8, 0x47, @u32=0x7fff}]}, 0x20c}, {&(0x7f00000006c0)={0x74, 0x34, 0x120, 0x70bd2b, 0x25dfdbfe, "", [@generic='l:', @generic="9c193ceedd506e2b4eedac8f3bbbe10ec4f905d1ec407887dcdb94dc5c7fe1ccae9c47d62ecc89495d0b09dd585a928f0bbbb8e50b6360f590db649598a5bb9fa02915ccc11daf57ca8460e9d9503f23b286ae5e", @typed={0xc, 0x49, @u64=0x3}]}, 0x74}, {&(0x7f0000000740)={0x24, 0x36, 0x0, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x6f, @fd=r0}, @typed={0x4, 0x71}, @typed={0x8, 0x1e, @pid=r5}]}, 0x24}, {&(0x7f0000000840)={0x1290, 0x2c, 0x802, 0x70bd25, 0x25dfdbfd, "", [@typed={0x8, 0x21, @pid=r6}, @generic="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", @generic="888ae5861962a523791abdb22ceb6214ea556f43bb2b2db41a754d005291b2eca859fd4ab2420dcd2bee905df1e8ad9ea1e5a9a6d212c4aee04e5b9387f97bdb2dd6c52fe53d51a363ed145f8de000cc7f9912d2adab9fbfd728c0ce07e9b93351fc0481ca93489c412c1c7ebeef8243acc5633f7596893ec9e834e7b9d4df3ed3199681b19727ae246a34b7", @nested={0x194, 0x8b, [@generic="dae3a7512b0abe2a62a942f8202b61cdc72ce0dfee2793", @generic="c29e422bfe95b44ff4ff2204bda16eb2e249fddff5fd732190ebee077a09d114accd59b894a9d010940aabe825ca073a8f417d73261f7eea843b512a35c4e20816c59e69e2d8a5a5675af34184232c1f", @generic="274fd116169b4c93d116a5e8d860f04a22f2c74217e9910dd6fbc9c7f46e56", @typed={0x1c, 0x85, @str='/dev/infiniband/rdma_cm\x00'}, @generic="880316362d4e0a9c6764f87f", @typed={0x1c, 0x32, @str='/dev/infiniband/rdma_cm\x00'}, @generic="b97eda1c844ec11b4772cfeef1469d386c91ac1d651afdbe1a83d2cabd9f175df8548dc31a31484d4369ca579ec11780c53cb813250d1ed4920165ed223e86deb8805094edef9d6df86099fb765c6fc60bc10454fa7e4629186f2745d8472371f293e51050070f41e2f311d8babb8ead524536d809a0231b11c51f5680e9020f583be7c97779abc52333211803fff0c0ed97abe48ff83fdaa4adbe5a7ccdee6900190471a368662f7a59c358087dad2ba339f26fe8", @typed={0x8, 0x32, @u32=0x6}, @typed={0x8, 0x5d, @uid=r7}]}, @generic="62ce5e92a42588108c0b9a6ec341adfdabb18be534e6679dd55526b35a08173f6faef81e7acf32a42d9f66cc9a957229448ed4aacc3b8e19268e66a50e334834a918f3680c044f6557f3c007bb89417a45b087e433ec"]}, 0x1290}], 0x5, 0x0, 0x0, 0x80}, 0x40) 14:52:58 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x100, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) mq_timedsend(r2, &(0x7f00000003c0)="5c0c5d7fd0c74205ea3a1be75519d5e6072dbc870080e2624b8d0f055e9a02afbe979bdb157b4e594990c503eedb9c483841fd637e5f3e6d710b07f37a46757a9edfbbde74d32ecc3713fae6d5b64623a2ddc6f972d934227a2d29d333c87fef89c72d7d34d745392aaeb54fd417ab9fdbec37c51116c458f5125dd3fc0fbec8e8b3bc8d6b0ca992158a0dbbac6f13dbc0994a79dda28cb373e9352cc2804002963bb396096ba5b268baca98bac028629c0923554f69", 0xb6, 0x401, &(0x7f0000000480)={r3, r4+30000000}) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000240)={0x5491, 0x400, 0x4, {0x7, @sliced={0x100, [0x100000000, 0x71b1499c, 0x9, 0x1, 0x9, 0x3, 0x4e40, 0x10000, 0x9, 0x0, 0x28b, 0xb3, 0x8, 0x81, 0x4, 0xffffffffffffffff, 0x2, 0x3, 0x5, 0x2, 0x74, 0xbc, 0x5, 0x0, 0x8, 0xb611, 0x6, 0x7, 0x7ff, 0xbd9, 0x0, 0x20, 0x6, 0x101, 0x3, 0x2, 0x4, 0xffffffffbeb5e7d5, 0x1, 0x7, 0x17d0be37, 0xe6bf, 0x0, 0x8, 0x1, 0x7fffffff, 0xef47, 0x6], 0x9}}}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x1, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x800, 0x0) ioctl$KDDISABIO(r6, 0x4b37) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 14:52:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) 14:52:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) 14:52:58 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0x8bffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1998.042256][ T26] audit: type=1326 audit(1550155978.218:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31513 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0x0 [ 1998.121936][T32377] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1998.123466][T32374] binder: 32372:32374 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 1998.150556][T32377] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:52:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630e}], 0x0, 0x0, 0x0}) 14:52:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @rand_addr="4875e156264f54ef63420d1ed0262280"}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 14:52:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000400, 0x0, 0x0, 0x20000430, 0x200005f0], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x4, 0x0, 'lapb0\x00', 'nlmon0\x00', 'nr0\x00', 'syzkaller0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0x108}, [@common=@log={'log\x00', 0x28, {{0x4, "beec8f13b8174b2c37104ceb4e9f0a5a406068fd14370d8563f99894a84e", 0x4}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xeb, 0x2, 0xff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x210) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(0xffffffffffffffff, &(0x7f0000000080), 0xe0) [ 1998.317903][T32673] binder: 32615:32673 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 1998.349519][T32379] ================================================================== [ 1998.349869][T32683] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1998.357905][T32379] BUG: KASAN: use-after-free in __list_del_entry_valid+0xdc/0xf5 [ 1998.357920][T32379] Read of size 8 at addr ffff88809011aea8 by task syz-executor.5/32379 [ 1998.357923][T32379] [ 1998.357937][T32379] CPU: 0 PID: 32379 Comm: syz-executor.5 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1998.357945][T32379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1998.357949][T32379] Call Trace: [ 1998.357970][T32379] dump_stack+0x172/0x1f0 [ 1998.357984][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1998.358001][T32379] print_address_description.cold+0x7c/0x20d [ 1998.358013][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1998.358025][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1998.358047][T32379] kasan_report.cold+0x1b/0x40 [ 1998.358061][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1998.358076][T32379] __asan_report_load8_noabort+0x14/0x20 [ 1998.358088][T32379] __list_del_entry_valid+0xdc/0xf5 [ 1998.358106][T32379] cma_cancel_operation+0x2d7/0xa10 [ 1998.358126][T32379] rdma_destroy_id+0x8d/0xab0 [ 1998.389947][T32683] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1998.394307][T32379] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1998.394332][T32379] ? complete+0x61/0x80 [ 1998.394354][T32379] ucma_close+0x115/0x320 [ 1998.394372][T32379] ? ucma_free_ctx+0xb90/0xb90 [ 1998.394384][T32379] __fput+0x2e5/0x8d0 [ 1998.394403][T32379] ____fput+0x16/0x20 [ 1998.394416][T32379] task_work_run+0x14a/0x1c0 [ 1998.394435][T32379] do_exit+0x90a/0x2fa0 [ 1998.394451][T32379] ? __sched_text_start+0x8/0x8 [ 1998.394471][T32379] ? do_group_exit+0x2e9/0x370 [ 1998.518940][T32379] ? mm_update_next_owner+0x640/0x640 [ 1998.524315][T32379] ? preempt_schedule_common+0x4f/0xe0 [ 1998.529776][T32379] ? preempt_schedule+0x4b/0x60 [ 1998.534622][T32379] ? ___preempt_schedule+0x16/0x18 [ 1998.539736][T32379] do_group_exit+0x135/0x370 [ 1998.544333][T32379] __x64_sys_exit_group+0x44/0x50 [ 1998.549356][T32379] do_syscall_64+0x103/0x610 [ 1998.553948][T32379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1998.559833][T32379] RIP: 0033:0x457e29 [ 1998.563726][T32379] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1998.583355][T32379] RSP: 002b:00007ffdd0f0da98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1998.591770][T32379] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000457e29 [ 1998.599737][T32379] RDX: 0000000000411c71 RSI: 0000000000a54ef0 RDI: 0000000000000000 [ 1998.607704][T32379] RBP: 00000000004bd560 R08: 000000000000000c R09: 00007ffdd0f0dba0 [ 1998.615666][T32379] R10: 0000000001045940 R11: 0000000000000246 R12: 000000000073bfac [ 1998.623631][T32379] R13: 0000000000000001 R14: 0000000000000004 R15: 000000000073bfac [ 1998.631607][T32379] [ 1998.633931][T32379] Allocated by task 32387: [ 1998.638353][T32379] save_stack+0x45/0xd0 [ 1998.642504][T32379] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1998.648127][T32379] kasan_kmalloc+0x9/0x10 [ 1998.652450][T32379] kmem_cache_alloc_trace+0x151/0x760 [ 1998.657819][T32379] __rdma_create_id+0x5f/0x4e0 [ 1998.662580][T32379] ucma_create_id+0x1de/0x640 [ 1998.667250][T32379] ucma_write+0x2da/0x3c0 [ 1998.671575][T32379] __vfs_write+0x8d/0x110 [ 1998.675913][T32379] vfs_write+0x20c/0x580 [ 1998.680150][T32379] ksys_write+0xea/0x1f0 [ 1998.684391][T32379] __x64_sys_write+0x73/0xb0 [ 1998.688975][T32379] do_syscall_64+0x103/0x610 [ 1998.693559][T32379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1998.699433][T32379] [ 1998.701749][T32379] Freed by task 32386: [ 1998.705815][T32379] save_stack+0x45/0xd0 [ 1998.709962][T32379] __kasan_slab_free+0x102/0x150 [ 1998.714897][T32379] kasan_slab_free+0xe/0x10 [ 1998.719393][T32379] kfree+0xcf/0x230 [ 1998.723196][T32379] rdma_destroy_id+0x723/0xab0 [ 1998.727955][T32379] ucma_close+0x115/0x320 [ 1998.732277][T32379] __fput+0x2e5/0x8d0 [ 1998.736254][T32379] ____fput+0x16/0x20 [ 1998.740225][T32379] task_work_run+0x14a/0x1c0 [ 1998.744809][T32379] exit_to_usermode_loop+0x273/0x2c0 [ 1998.750090][T32379] do_syscall_64+0x52d/0x610 [ 1998.754676][T32379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1998.760553][T32379] [ 1998.762879][T32379] The buggy address belongs to the object at ffff88809011acc0 [ 1998.762879][T32379] which belongs to the cache kmalloc-2k of size 2048 [ 1998.776932][T32379] The buggy address is located 488 bytes inside of [ 1998.776932][T32379] 2048-byte region [ffff88809011acc0, ffff88809011b4c0) [ 1998.790283][T32379] The buggy address belongs to the page: [ 1998.795919][T32379] page:ffffea0002404680 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 1998.806588][T32379] flags: 0x1fffc0000010200(slab|head) [ 1998.811961][T32379] raw: 01fffc0000010200 ffffea00021c3708 ffffea0002a0f988 ffff88812c3f0c40 [ 1998.820541][T32379] raw: 0000000000000000 ffff88809011a440 0000000100000003 0000000000000000 [ 1998.829113][T32379] page dumped because: kasan: bad access detected [ 1998.835509][T32379] [ 1998.837821][T32379] Memory state around the buggy address: [ 1998.843447][T32379] ffff88809011ad80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1998.851503][T32379] ffff88809011ae00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1998.859557][T32379] >ffff88809011ae80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 14:52:59 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0xa1ffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1998.867606][T32379] ^ [ 1998.872987][T32379] ffff88809011af00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1998.881049][T32379] ffff88809011af80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1998.889101][T32379] ================================================================== [ 1998.897150][T32379] Disabling lock debugging due to kernel taint [ 1998.912325][T32379] Kernel panic - not syncing: panic_on_warn set ... [ 1998.918936][T32379] CPU: 0 PID: 32379 Comm: syz-executor.5 Tainted: G B 5.0.0-rc6-next-20190214 #35 [ 1998.929415][T32379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1998.939459][T32379] Call Trace: [ 1998.942756][T32379] dump_stack+0x172/0x1f0 [ 1998.947093][T32379] panic+0x2cb/0x65c [ 1998.950986][T32379] ? __warn_printk+0xf3/0xf3 [ 1998.955575][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1998.960951][T32379] ? preempt_schedule+0x4b/0x60 [ 1998.965804][T32379] ? ___preempt_schedule+0x16/0x18 [ 1998.970916][T32379] ? trace_hardirqs_on+0x5e/0x230 [ 1998.975942][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1998.981317][T32379] end_report+0x47/0x4f [ 1998.985572][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1998.990940][T32379] kasan_report.cold+0xe/0x40 [ 1998.995615][T32379] ? __list_del_entry_valid+0xdc/0xf5 [ 1999.000982][T32379] __asan_report_load8_noabort+0x14/0x20 [ 1999.006601][T32379] __list_del_entry_valid+0xdc/0xf5 [ 1999.010203][ T3874] kobject: 'loop1' (0000000098aa70f4): kobject_uevent_env 14:52:59 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0xe4ffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1999.011788][T32379] cma_cancel_operation+0x2d7/0xa10 [ 1999.011809][T32379] rdma_destroy_id+0x8d/0xab0 [ 1999.011831][T32379] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1999.011850][T32379] ? complete+0x61/0x80 [ 1999.011870][T32379] ucma_close+0x115/0x320 [ 1999.011893][T32379] ? ucma_free_ctx+0xb90/0xb90 [ 1999.019005][ T3874] kobject: 'loop1' (0000000098aa70f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1999.024479][T32379] __fput+0x2e5/0x8d0 [ 1999.024493][T32379] ____fput+0x16/0x20 [ 1999.024505][T32379] task_work_run+0x14a/0x1c0 14:52:59 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x0, 0xf4ffffff}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) getegid() [ 1999.024520][T32379] do_exit+0x90a/0x2fa0 [ 1999.024534][T32379] ? __sched_text_start+0x8/0x8 [ 1999.024553][T32379] ? do_group_exit+0x2e9/0x370 [ 1999.084543][T32379] ? mm_update_next_owner+0x640/0x640 [ 1999.089917][T32379] ? preempt_schedule_common+0x4f/0xe0 [ 1999.095380][T32379] ? preempt_schedule+0x4b/0x60 [ 1999.100236][T32379] ? ___preempt_schedule+0x16/0x18 [ 1999.105380][T32379] do_group_exit+0x135/0x370 [ 1999.109972][T32379] __x64_sys_exit_group+0x44/0x50 [ 1999.114995][T32379] do_syscall_64+0x103/0x610 [ 1999.119581][T32379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1999.125456][ T3874] kobject: 'loop1' (0000000098aa70f4): kobject_uevent_env [ 1999.125482][ T3874] kobject: 'loop1' (0000000098aa70f4): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1999.132555][T32379] RIP: 0033:0x457e29 [ 1999.132570][T32379] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1999.132578][T32379] RSP: 002b:00007ffdd0f0da98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1999.132591][T32379] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000457e29 [ 1999.132598][T32379] RDX: 0000000000411c71 RSI: 0000000000a54ef0 RDI: 0000000000000000 [ 1999.132606][T32379] RBP: 00000000004bd560 R08: 000000000000000c R09: 00007ffdd0f0dba0 [ 1999.132613][T32379] R10: 0000000001045940 R11: 0000000000000246 R12: 000000000073bfac [ 1999.132621][T32379] R13: 0000000000000001 R14: 0000000000000004 R15: 000000000073bfac [ 1999.133765][T32379] Kernel Offset: disabled [ 1999.219883][T32379] Rebooting in 86400 seconds..