&(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x4, 0x2, 0x0, 0x0, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x0, 0x0, 0x3, 0xf80f}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x15, 0x0, 0x0, 0x0, 0x10001}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:55 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:35:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5bb, 0x0, 0x0, 0x0, 0x5, 0x40, 0x8000000000ffe}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff07be1180000bf4e0b7a9bc1e3aaba5d96576e2"], 0x0, 0x15}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x9, 0x3, 0xe3}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x95, 0x58, 0x0, 0x0, 0x10001}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:56 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:35:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x230, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc113}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000002, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4285fe03}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x5, 0x2, 0x1}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x4, 0x23, 0x7, 0x0, 0x3}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:35:57 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:35:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xaa3, 0x0, 0x82, 0x0, 0x0, 0x0, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:58 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:35:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x95, 0x58, 0x0, 0x20}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4caa}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x95, 0x0, 0x0, 0x20, 0x10001}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x4, 0x23, 0x7, 0x20}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:35:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x230, 0x0, 0x0, 0x0, 0xfee1, 0x100000002, 0x7}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:59 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:35:59 executing program 1: semget(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x100000000000007, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) io_setup(0x10001, &(0x7f00000011c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") io_submit(0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") 04:35:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x3c, 0x0, {"4932428a08ea6f2a44747697690ea7aa4cb570992b71f0d4ec4c13bd37d2986271"}}, {0x0, "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"}}, 0x0, 0x102a}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x4, 0x23, 0x0, 0x20, 0x3}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:35:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x70, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d78"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546"}}, 0x0, 0x91}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:35:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x74, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d7874470165"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003454c28e4b71259db426f2b781e"}}, 0x0, 0xdd}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:00 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb, 0x0, 0x4285fe03}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 547.556481] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.564313] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.571316] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.578571] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.585632] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.592728] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.599758] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.606899] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.613922] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.620952] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 547.628275] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 04:36:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x0, 'io'}, {0x0, 'io'}, {0x2d, 'rdma'}, {0x2b, 'io'}]}, 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, r1, 0x0, 0x1d, &(0x7f0000000340)='cpuset-*vboxnet0proc/$/!user\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r2, 0x0, 0x6, &(0x7f0000000280)='memory', r3}, 0x30) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000740)={&(0x7f0000000580)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x4008004) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x800, 0x13b, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 547.891804] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x10063, 0x0) 04:36:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40000141, 0x0) 04:36:01 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) [ 548.445088] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.452171] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.459483] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.466625] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.473680] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.480585] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.487930] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 04:36:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) syz_execute_func(&(0x7f0000000100)="ba42440fe4f564ff0941c342c4c27d794e0066420fe27fe3e30f11108c4219") clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) sendmsg(r1, &(0x7f0000001480)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x315, 0x0}, 0x20000000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) 04:36:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) sendmsg(r1, &(0x7f0000001480)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x315, 0x0}, 0x20000000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) 04:36:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/88, 0x58) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c2a37d794e005cc4c1b62ac13e0f1110c442019dccd3196f27") socket$inet(0x2, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000080)={0x1}) [ 548.494917] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.501874] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.508712] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 548.515705] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 04:36:01 executing program 1: 04:36:01 executing program 3: 04:36:02 executing program 2: [ 548.989037] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:02 executing program 4: 04:36:02 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:02 executing program 1: 04:36:02 executing program 2: [ 549.498831] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.505835] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.512872] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.519724] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.526722] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.533724] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.540696] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 04:36:02 executing program 3: [ 549.547754] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.556276] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.563250] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 549.570079] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 04:36:02 executing program 5: 04:36:02 executing program 2: 04:36:02 executing program 3: 04:36:02 executing program 1: [ 549.991205] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:03 executing program 2: 04:36:03 executing program 4: 04:36:03 executing program 3: 04:36:03 executing program 5: 04:36:03 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:03 executing program 2: 04:36:03 executing program 4: 04:36:03 executing program 1: [ 550.626847] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.634006] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.640864] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.647925] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.655013] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.661989] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.668832] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 04:36:03 executing program 5: [ 550.675907] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.682845] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.689691] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 550.696685] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 04:36:03 executing program 4: 04:36:04 executing program 5: 04:36:04 executing program 3: [ 551.154801] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:04 executing program 4: 04:36:04 executing program 5: 04:36:04 executing program 3: 04:36:04 executing program 2: 04:36:04 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:04 executing program 1: [ 551.588485] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.595489] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.602568] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.609416] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.616414] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.623341] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.630335] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.637465] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.644449] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.651279] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 551.658260] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 04:36:04 executing program 2: 04:36:04 executing program 3: 04:36:05 executing program 5: 04:36:05 executing program 4: 04:36:05 executing program 2: [ 552.115972] hid-generic 0000:0000:0000.0012: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:05 executing program 5: 04:36:05 executing program 1: 04:36:05 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:05 executing program 4: 04:36:05 executing program 5: 04:36:05 executing program 2: [ 552.833617] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.840869] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.848190] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.855305] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.862406] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.869408] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.876705] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 04:36:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x70, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d78"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003454c28e4"}}, 0x0, 0xd0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 552.884279] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.891408] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.898669] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.905721] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 552.915765] hid-generic 0000:0000:0000.0013: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:06 executing program 1: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x10}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965"}}, 0x0, 0x35}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getgroups(0x1, &(0x7f0000000500)=[0xee00]) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x0, 0x23, 0x0, 0x0, 0x200}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r1 = dup(r0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000640)={0x0, 0x0, 0x80, 0x7fffffff, 0x15, 0xe5f, 0x40, 0x10001, 0xa47f15a, 0xfffffffffffff6a7, 0x401, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 04:36:06 executing program 4: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x12, 0x0, 0x0, 0x4}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:07 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) gettid() openat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) times(&(0x7f0000000980)) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, 0x0) 04:36:07 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) [ 554.208232] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.215272] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.222251] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.229379] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.236506] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.243498] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.250429] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.257496] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.264458] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.271268] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.278339] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 554.400339] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x181002, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x51) 04:36:07 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x181002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x456, 0xfffffffffffffffd) write$P9_RXATTRCREATE(r0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0), 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000980), 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) [ 554.762952] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.769947] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.777058] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.784084] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.791303] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.798392] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.805402] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 04:36:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0xfffffffffffffffe, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, 0x0) [ 554.812415] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.819263] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.826252] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 554.833594] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 04:36:07 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xffffffffffffffae, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sched_rr_get_interval(0x0, 0x0) listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, 0x0, 0x0) 04:36:08 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() setxattr$security_ima(0x0, 0x0, 0x0, 0x19e, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$get_keyring_id(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$9p(r0, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x2710}) accept(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) tkill(r1, 0x1000000000016) 04:36:08 executing program 3: [ 555.185413] hid-generic 0000:0000:0000.0015: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:08 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:08 executing program 3: 04:36:08 executing program 5: 04:36:08 executing program 2: 04:36:08 executing program 1: [ 555.715230] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.722429] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.729774] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.737149] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.744344] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.751369] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.758928] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 04:36:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) removexattr(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) dup3(r0, r1, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000780)={0x0, 0x9b1}) [ 555.766010] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.773097] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.780111] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 555.787344] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 04:36:09 executing program 2: 04:36:09 executing program 1: 04:36:09 executing program 5: [ 556.134288] hid-generic 0000:0000:0000.0016: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:09 executing program 3: 04:36:09 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{0x0}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:09 executing program 2: 04:36:09 executing program 1: 04:36:09 executing program 2: [ 556.751606] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.759019] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.766339] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.773586] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.780623] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.788239] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.795329] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 04:36:09 executing program 4: 04:36:09 executing program 1: 04:36:09 executing program 3: [ 556.802379] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.809399] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.816633] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 556.823910] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 04:36:10 executing program 5: 04:36:10 executing program 2: 04:36:10 executing program 1: 04:36:10 executing program 4: [ 557.269578] hid-generic 0000:0000:0000.0017: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:10 executing program 3: 04:36:10 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{0x0}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:10 executing program 1: 04:36:10 executing program 4: 04:36:10 executing program 2: 04:36:10 executing program 5: [ 557.882973] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.889902] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.897045] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.904048] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.910883] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.917822] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.924769] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.931633] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.938610] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.945597] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 557.952561] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 04:36:11 executing program 5: 04:36:11 executing program 1: 04:36:11 executing program 3: 04:36:11 executing program 4: 04:36:11 executing program 2: [ 558.422890] hid-generic 0000:0000:0000.0018: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:11 executing program 1: 04:36:11 executing program 5: 04:36:11 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{0x0}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:11 executing program 2: 04:36:12 executing program 4: [ 558.981160] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 558.988210] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 558.995346] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 559.002353] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 559.009296] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 559.016594] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 559.023577] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 04:36:12 executing program 3: [ 559.030478] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 559.037525] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 559.044510] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 559.051351] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 04:36:12 executing program 1: 04:36:12 executing program 5: 04:36:12 executing program 4: 04:36:12 executing program 2: 04:36:12 executing program 1: [ 559.487733] hid-generic 0000:0000:0000.0019: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:12 executing program 2: 04:36:12 executing program 4: 04:36:12 executing program 1: 04:36:12 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{0x0}, {0x0}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:13 executing program 2: 04:36:13 executing program 5: 04:36:13 executing program 3: [ 560.093080] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.099957] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.106986] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.113970] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.120831] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.127930] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.135008] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.142214] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.149100] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.156112] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 560.163076] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 04:36:13 executing program 1: 04:36:13 executing program 5: 04:36:13 executing program 3: 04:36:13 executing program 2: 04:36:13 executing program 1: [ 560.673881] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:13 executing program 2: 04:36:14 executing program 4: 04:36:14 executing program 3: 04:36:14 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{0x0}, {0x0}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) removexattr(0x0, &(0x7f0000000340)=@known='trusted.overlay.origin\x00') setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e30f3802e9c442019dccd3196f") clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0xfffffffffffffffe, 0x0) fcntl$addseals(r1, 0x409, 0x1) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000280)={0xff, 0x0, 0x400, 0x200}, 0x10) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000100)="9135b6bfaf096f13f8d8a03ff1d6fc5e593c02eb9d56d9dbc742088d572dcb0843d0420ad9558d33aa1ddf17e6bd9fd3ed9ccc351c09d883eeb40bafb120c31e235d27bb8d92d2f0cf2685da0d77b436b00587bf7568c8316fdabcf0b240e4620c4d78a53de98c41b731581b0487998c584b51c33ce77fb54740858e03eeb3") ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000180)={'erspan0\x00', {0x2, 0x4e24, @multicast2}}) 04:36:14 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0x3ff) dup(0xffffffffffffffff) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) getrandom(&(0x7f0000000680)=""/244, 0x17ffb052ffe09f44, 0x0) 04:36:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c30f0f441e04a4c4c27d794e0066420fe2e33e0f1110c442019dcc") clone(0xb102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x10, 0x3, 0x3) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) [ 561.451574] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.458745] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.465787] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.472790] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.479649] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.486626] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.493653] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 04:36:14 executing program 1: clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="c0a486264c5b1a2a7ef0ff954d003bb6", 0x10) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 04:36:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/88, 0x58) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c2a37d794e005cc4c1b62ac13e0f1110c442019dccd3196f27") r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r2 = epoll_create(0x13c32e00) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) sendmmsg$unix(r1, &(0x7f0000002640)=[{&(0x7f0000000240)=@abs, 0x6e, 0x0}], 0x1, 0x20004000) [ 561.500517] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.507502] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.514569] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 561.521446] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 04:36:14 executing program 3: syz_execute_func(&(0x7f0000000300)="64ff0941c3c4e2c997584242d2fd266765660f3a2a4941c442019dccd3196f0668cd") symlink(&(0x7f00000001c0)='./file2\x00', &(0x7f0000000100)='./file2\x00') clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000a00)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x1da) dup2(r0, r1) execve(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x10000000000841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file2\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) 04:36:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000001c0)=r0, 0x4) sendmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, 0x0}, 0x0) 04:36:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf200000000000000700000008ffffffad2301000000000095000000000000006916000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 562.004188] hid-generic 0000:0000:0000.001B: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:15 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{0x0}, {0x0}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 04:36:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x40003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xccb8) [ 562.370399] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.377566] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.385029] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.392124] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.399081] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.406071] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.413120] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.419981] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.428797] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.438514] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 562.445688] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 04:36:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0, 0x8dc}, 0x28) 04:36:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000002c0)='memory.events\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x100000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200, 0x1, 0x9, 0x7fffffff, 0x0, 0xd5a, 0xa9, 0x0, 0x7fffffff, 0x0, 0x0, 0xffffffffffffffab, 0x2, 0x7, 0x2a52, 0x0, 0xf624, 0x1ff, 0xfffffffffffff800, 0x100000000, 0x4, 0x600000, 0x3f, 0x7, 0x5, 0x3, 0x7, 0x1f, 0x8, 0x100000000, 0x0, 0x9, 0x6, @perf_config_ext={0x0, 0x9}, 0x11000, 0x3a, 0x4, 0x0, 0x4, 0xffffffff, 0x8}, 0x0, 0xb, r0, 0x8) write$cgroup_int(r2, &(0x7f0000000200), 0x26000) write$cgroup_int(r1, &(0x7f0000000000), 0x12) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) write$cgroup_int(r1, &(0x7f0000000300)=0x1, 0x12) 04:36:15 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x362ed2a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3001}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x530) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 562.808040] hid-generic 0000:0000:0000.001C: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:16 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000100), 0x4) 04:36:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 04:36:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='nodevselinuxproc+\x00', 0xffffffffffffff9c}, 0x10) [ 563.413199] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.420397] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.427609] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.434604] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.441593] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.448566] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.455599] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 04:36:16 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) [ 563.462596] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.469638] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.476628] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 563.483576] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 04:36:16 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) dup2(r0, r1) 04:36:16 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwritev(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1, 0x0) 04:36:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x28000000, 0x4004400}) [ 563.768388] hid-generic 0000:0000:0000.001D: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) dup2(r0, 0xffffffffffffffff) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 04:36:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x200000000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x5, 0x9}, 0x8) 04:36:17 executing program 5: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000100)={[0x40000000, 0x40000000], 0x0, 0x81, 0xb, 0x3}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) 04:36:17 executing program 3: rt_sigtimedwait(&(0x7f0000000080), 0x0, &(0x7f00000001c0), 0x8) 04:36:17 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000100), 0x4) 04:36:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 04:36:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00'}, 0x0) [ 565.095826] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.103424] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.110601] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.119157] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.126340] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.133503] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.140751] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.147837] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.154959] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.162235] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.169262] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 565.527403] hid-generic 0000:0000:0000.001E: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:18 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) 04:36:18 executing program 3: modify_ldt$write2(0x11, &(0x7f00000001c0), 0x10) 04:36:19 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000100), 0x4) [ 566.148517] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.155865] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.163072] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.170221] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.181152] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.188250] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.195239] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.202220] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.209201] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.216165] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 566.223137] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 04:36:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x1c, &(0x7f0000000100)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 04:36:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) [ 566.317079] hid-generic 0000:0000:0000.001F: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:19 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 04:36:19 executing program 5: chroot(0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000100)={[0x40000000, 0x40000000], 0x0, 0x81, 0xb}) 04:36:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 04:36:19 executing program 3: 04:36:20 executing program 1: 04:36:20 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, 0x0, 0x0) [ 567.365225] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.372269] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.379115] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.386141] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.393138] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.400078] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.407131] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.414318] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.421163] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.428542] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.436034] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 567.534536] hid-generic 0000:0000:0000.0020: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:20 executing program 1: 04:36:20 executing program 5: 04:36:20 executing program 1: 04:36:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 04:36:21 executing program 3: 04:36:21 executing program 5: 04:36:21 executing program 2: 04:36:21 executing program 1: 04:36:21 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, 0x0, 0x0) 04:36:21 executing program 5: 04:36:21 executing program 3: [ 568.953036] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 568.959896] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 568.967031] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 568.976606] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 568.983584] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 568.990462] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 568.997541] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 569.004505] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 569.011354] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 569.018391] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 569.025575] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 04:36:22 executing program 2: 04:36:22 executing program 1: [ 569.445459] hid-generic 0000:0000:0000.0021: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:22 executing program 1: 04:36:22 executing program 4: 04:36:22 executing program 2: 04:36:22 executing program 5: 04:36:23 executing program 3: 04:36:23 executing program 1: 04:36:23 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}, {0x0, 0x1d4}], 0x2) write$UHID_DESTROY(r0, 0x0, 0x0) 04:36:23 executing program 4: 04:36:23 executing program 2: [ 570.192753] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.199675] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.206956] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.213982] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.220843] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.228210] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.235348] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.242390] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.249246] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.256325] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 570.263393] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 04:36:23 executing program 5: 04:36:23 executing program 4: 04:36:23 executing program 1: 04:36:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0xffffffff) [ 570.769578] hid-generic 0000:0000:0000.0022: hidraw0: HID v0.00 Device [syz1] on syz1 04:36:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) keyctl$get_keyring_id(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pipe2(0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000240)) 04:36:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.cpus\x00', 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000280)={'syz1'}, 0x4) 04:36:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioperm(0x0, 0x8001, 0x0) 04:36:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa"}}, 0x0, 0x3b}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(0xffffffffffffffff, 0x6431) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c5820000000000000000a5ddf7", 0x10) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff9a, 0x0, 0x0, 0xfffffffffffffef2) 04:36:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[{0x28, 0x0, 0x0, "faeaa2cabe3fe0a396883849e1e14b8c6f"}], 0x28}}], 0x1, 0x4044) 04:36:24 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) 04:36:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3ff, 0x0, 0xffffffffffffffff, 0x0, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:24 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40400, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f0000000180)=0x1e) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000001c0)={0x6, 0x0, 0x408000000}) connect$inet6(r2, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) fcntl$setstatus(r2, 0x4, 0x0) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000780)='/dev/kvm\x00', 0x280, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{0x20, 'ppp1$'}], 0xa, "c2174f646bc5cd5c2cd003e77e9e41abb728a0d04a42c50ec66d2db7d001de9204238c7aba879e282b618eaba9f5e3aaba34232f6c36173cd9d5397e7c1445799be955062f542bd8e12ddff9fc1956205e86793b8e234cf09489408145ea552bbb795cdd1c93a1c406e97f1e45d9062304"}, 0x82) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) setsockopt$inet6_int(r2, 0x29, 0xd7, &(0x7f0000000100)=0xfffffffffffffe01, 0x4) getpgrp(0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 04:36:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) r0 = eventfd(0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r0, r2, 0x0, 0x40000000009) 04:36:24 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0xffffffff) 04:36:25 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)) 04:36:25 executing program 4: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usbmon(0x0, 0x1, 0x0) mmap(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0xfffffe5f, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 04:36:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f00000000c0)) 04:36:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xb1dd, 0x0, 0x3, 0x2, 0x0, 0x0, 0x8}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xb1dd, 0x0, 0x3, 0x2, 0x2, 0x0, 0x8000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/current\x00') write$P9_RFSYNC(r0, 0x0, 0x246) 04:36:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x40000000200000, 0x82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) 04:36:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) sendmsg$alg(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000f40)="a7", 0x1}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) 04:36:26 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/252, 0xfc) 04:36:26 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 04:36:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xb1dd, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffe, 0x8}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:26 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)) 04:36:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6}, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$P9_RFLUSH(r0, 0x0, 0x0) 04:36:27 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0x0, 0x4}) 04:36:27 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.cpus\x00', 0x2, 0x0) lseek(r1, 0x0, 0x3) 04:36:27 executing program 0: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 04:36:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x40000000200000, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CLR_FD(r0, 0x4c01) keyctl$get_keyring_id(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) 04:36:28 executing program 4: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x1000000, 0x40010, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000780), 0x0) shmget(0x2, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x0, 0x10000}) 04:36:28 executing program 1: fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 04:36:28 executing program 2: accept4$packet(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x4}) 04:36:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:36:28 executing program 5: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x4) 04:36:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x6, 0x8}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 04:36:28 executing program 1: fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 04:36:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) 04:36:28 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) 04:36:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) 04:36:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xb1dd, 0x0, 0x5, 0x2, 0x0, 0x4}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 04:36:29 executing program 2: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)="f7c0340e56e17603ace41fa441531628a6ca9f43aae7fb", 0x17}, 0x68) 04:36:29 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000200)) 04:36:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 04:36:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r0, 0x0) 04:36:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 04:36:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/current\x00') fchmod(r0, 0x0) 04:36:30 executing program 0: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000001c0)) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) openat$kvm(0xffffffffffffff9c, &(0x7f0000000780)='/dev/kvm\x00', 0x280, 0x0) write$binfmt_script(r0, 0x0, 0x0) 04:36:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000380)='./bus\x00', 0x141046, 0x0) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000300)='<', 0x1}], 0x1) 04:36:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, 0x0, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) sendmsg$alg(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000f40)="a7ceec2903f85e44e831a98ade833c88c574ec1b8628fcbe2e3f24a70bad5e3b834d0f97cd4ff84e43512604fd16d2fb1223a3437aa9d5c2b7f7fbf04bc53cdc0f3eab8cec0c6d21bf9fa7a4d9c91d", 0x4f}, {0x0}], 0x2}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) 04:36:30 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000001c0)={0x6, 0x0, 0x408000000}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) fcntl$setstatus(r1, 0x4, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) openat$kvm(0xffffffffffffff9c, &(0x7f0000000780)='/dev/kvm\x00', 0x280, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, 'ppp1$'}], 0xa, "c2174f646bc5cd5c2cd003e77e9e41abb728a0d04a42c50ec66d2db7d001de9204238c7aba879e282b618eaba9f5e3aaba34232f6c36173cd9d5397e7c1445799be955062f542bd8e12ddff9fc1956205e86793b8e234cf09489408145ea552bbb795cdd1c93a1c406e97f1e45d9062304"}, 0x82) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 04:36:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xb1dd, 0x0, 0x3, 0x2, 0x0, 0x0, 0xffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchmodat(0xffffffffffffffff, 0x0, 0x0) 04:36:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x200000000000000, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000001c0)=""/74) 04:36:30 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/current\x00') fchown(r0, 0x0, 0x0) 04:36:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(0xffffffffffffffff, 0x6431) r1 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c5820000000000000000a5ddf7", 0x10) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff9a, 0x0, 0x0, 0xfffffffffffffef2) 04:36:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) 04:36:31 executing program 2: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 04:36:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000000000000ff020000000000000000000000000001003f3920004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32801721afab69cc3712c37ed0"], 0x0) 04:36:31 executing program 0: 04:36:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x0, 0x0) 04:36:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x40000, 0x0) 04:36:32 executing program 3: 04:36:32 executing program 5: 04:36:32 executing program 1: 04:36:32 executing program 2: 04:36:32 executing program 4: 04:36:32 executing program 0: 04:36:32 executing program 1: 04:36:32 executing program 2: 04:36:32 executing program 4: 04:36:32 executing program 5: 04:36:32 executing program 1: 04:36:32 executing program 3: 04:36:33 executing program 2: 04:36:33 executing program 0: 04:36:33 executing program 1: 04:36:33 executing program 5: 04:36:33 executing program 4: 04:36:33 executing program 1: 04:36:33 executing program 4: 04:36:33 executing program 0: 04:36:33 executing program 2: 04:36:33 executing program 5: 04:36:33 executing program 1: 04:36:34 executing program 3: 04:36:34 executing program 4: 04:36:34 executing program 1: 04:36:34 executing program 5: 04:36:34 executing program 2: 04:36:34 executing program 0: 04:36:34 executing program 5: 04:36:34 executing program 1: 04:36:34 executing program 3: 04:36:34 executing program 4: 04:36:34 executing program 5: 04:36:35 executing program 2: 04:36:35 executing program 0: 04:36:35 executing program 5: 04:36:35 executing program 3: 04:36:35 executing program 4: 04:36:35 executing program 0: 04:36:35 executing program 5: 04:36:35 executing program 1: 04:36:35 executing program 2: 04:36:35 executing program 0: 04:36:35 executing program 5: 04:36:36 executing program 0: 04:36:36 executing program 5: 04:36:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x0, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x44, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d278"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba121"}}, 0x0, 0x7c}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff07be018000000217e215eb511a000000002c6563"], 0x0, 0x16}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:36 executing program 1: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x10, 0x0, 0x32}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xa3, 0x0, 0x80000000210, 0x0, 0x9, 0x9c, 0x2}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:37 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0xb}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:37 executing program 2: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x32, 0x0, 0x1}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x74, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d7874470165"}}}, 0x0, 0x76}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x4, 0x2, 0x1}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x7, 0x0, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:38 executing program 4: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x32, 0x4}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff07be018000000217e23fb122597268192d2c"], 0x0, 0x14}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:38 executing program 2: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x40, 0xc52b, 0x0, 0x32, 0x4}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:39 executing program 1: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x5, 0x40, 0x0, 0x0, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x4c8f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x40, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa3"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003454c28e4b712"}}, 0x0, 0xa2}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:40 executing program 3: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x0, 0x32, 0x4}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x2, 0x20, 0x0, 0x8, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x800}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff0638082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003d9, 0x0, 0x2, 0x23, 0x2, 0x0, 0x10}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:36:40 executing program 5: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x40, 0xc52b, 0xfffffffffffffffb, 0x32}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x44, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d278"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114"}}, 0x0, 0x8e}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffff01}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff07be018000000217e23fb12259726819f6"], 0x0, 0x13}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x7fffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x20, 0x2, 0x8, 0x4c8f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f5151f", 0x17) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff07be018000000a17e23fb12259720a192dc31f"], 0x0, 0x15}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x74, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d7874470165"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003454c28e4b7"}}, 0x0, 0xd5}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4c8f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:43 executing program 5: socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x0, 0x0, 0x7fffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x44, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d278"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c"}}, 0x0, 0x68}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002d89634d22fc7b8061a16335cea50900f0"], 0x0, 0x13}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x44, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d278"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb5"}}, 0x0, 0x74}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:43 executing program 5: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734edbe04a460f3038082e67660f50e900004681e40000010068e131feabc4aba39d6c450754c4a1fd7f6500420fae9972b571112d02") 04:36:43 executing program 2: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x40002, 0x0, 0x0, 0x0, 0xc46f, 0x3}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x40, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa3"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e1"}}, 0x0, 0x89}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x34, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba121"}}, 0x0, 0x6c}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x20, 0x0, 0x20}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff09834c0000b122592268192d2c6563b357"], 0x0, 0x13}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x200000000000002, 0x2, 0x7, 0x0, 0x80000000000400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f30c44181c4fc0a00004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x2, 0x20, 0x0, 0x0, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x40, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa3"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003"}}, 0x0, 0x9c}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:46 executing program 3: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x80, 0x0, 0x0, 0x0, 0x2e, 0xfffffffffffffff3}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:46 executing program 2: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x5e6}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff01}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:46 executing program 4: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0xc52b, 0x7fff}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x30, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101"}}, 0x0, 0x69}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x40, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa3"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc2"}}, 0x0, 0x67}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x5, 0x40, 0x7f}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x81, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:47 executing program 3: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x32, 0x4}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff07be018000000217e23fb1225972fa63af93"], 0x0, 0x14}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:48 executing program 1: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x40002, 0x0, 0xd, 0x0, 0xc46f, 0x3}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000bc0)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="e6aba87806f1429db81451707dad6c10e5a821a5a84c53", 0x17}], 0x1}], 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x7, 0x81}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000bc0)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="e6aba87806f1429db81451707dad6c10e5a8", 0x12}], 0x1}], 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x81, 0x1000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:49 executing program 4: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0xd, 0x0, 0x0, 0x2e, 0x5e6}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x7c, &(0x7f0000000080)) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x81, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x2, 0x20}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000480)=""/21, 0x15}, {&(0x7f00000004c0)=""/211, 0xd3}, {&(0x7f0000000680)=""/241, 0xf1}, {&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x5}, 0x0) [ 597.257299] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 597.297183] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 597.379610] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 597.426510] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 04:36:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x1000000001, 0x84) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'dummy0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8912, &(0x7f0000000340)='trustedu\x00\xa0p\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 04:36:50 executing program 2: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0xc52b, 0xfffffffffffffffb, 0x32, 0x4}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4c8f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x8000, 0x0, 0x0, 0x20, 0x0, 0x8, 0x1}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:51 executing program 3: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0xfffffffffffffffb, 0x32}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f00000001c0)="4bfbc5e0a9913df8181e69901958d943", 0x10) ioctl$EVIOCSABS3F(r2, 0x401845ff, 0x0) 04:36:51 executing program 0: creat(&(0x7f0000000f80)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) pipe(&(0x7f0000001480)={0xffffffffffffffff}) splice(r1, 0x0, r0, 0x0, 0x7, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 04:36:51 executing program 2: r0 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000100), 0x1c) r3 = dup2(r2, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x7f}, @sack_perm], 0x20000000000000d0) dup2(r1, r0) ioctl$TCGETS(r3, 0x5401, 0x0) 04:36:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff8c3) prctl$PR_GET_TIMERSLACK(0x1e) syz_execute_func(&(0x7f0000000180)="3666440f9bf50f0145f341c3c4e2c9975842c4c3654c69000b3e0f1158101019c4429d478d0400000004cd04cd0f2902") 04:36:52 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) timer_create(0x1, 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000006c0), 0x10) 04:36:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842261a680d66420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_group_source_req(r1, 0x0, 0x30, &(0x7f0000000400)={0x0, {}, {{0x2, 0x0, @multicast2}}}, 0x108) exit(0x0) 04:36:52 executing program 3: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000001380)='threaded\x00', 0xd4b9c80) write$evdev(r0, 0x0, 0x0) 04:36:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)) r3 = dup2(r2, r1) syz_execute_func(&(0x7f0000000340)="3666440f50f564ff0941c30f0f441e04a4c4c27d794e0066420fe2e33e0f1110c442019dcc6f") clone(0xb102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000000)) 04:36:52 executing program 0: clone(0x10000084007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x114a, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) ptrace(0x11, r0) 04:36:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) dup2(r0, r0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0xa5, @dev}}, 0x1, 0x1, [{{0xa, 0x0, 0x400, @dev={0xfe, 0x80, [], 0x1d}, 0x100000000}}]}, 0x110) 04:36:53 executing program 5: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000001440)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) ptrace(0x11, r0) 04:36:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) pipe(&(0x7f0000001480)={0xffffffffffffffff}) splice(r1, 0x0, r0, 0x0, 0x7, 0x2) 04:36:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') pread64(r0, &(0x7f00000002c0)=""/4096, 0x1000, 0x54) 04:36:53 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)) 04:36:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x20400000, 0x0) 04:36:53 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xdc63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f000000fff8)='./file0\x00', 0x0, 0x7ffbf, 0x0) 04:36:53 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup(r0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0xba9f2ab3c06c5cae, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='bic\x00', 0x4) 04:36:54 executing program 4: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x2}, 0x20) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0), 0x4) 04:36:54 executing program 0: gettid() ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) listen(0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x1000000ac) 04:36:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x6, 0x9, 0x9, 0x10001}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x6, 0x9, 0x9, 0x10001, 0x200000007f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:54 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x1ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000480)={0x90000001}) 04:36:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) 04:36:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00ff07be1180000bf4e0b7a9bc1e3aaba5"], 0x0, 0x11}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x78, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d78744701656097dd85"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba121"}}, 0x0, 0xb0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7cc, 0x0, 0x4285fe05}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:55 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x5c63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000180)={0x28}, 0x28) 04:36:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="00038aa178036ed7e08f93dd86dd20fa60a96fe906dc31966f56882c9532406564910ba41e8e09000000000000007c0ad83201f5905532c08945192ef522a1cabc3a4688e47e6dd5fda8"], 0x4a) 04:36:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xff, 0x0, 0x2, 0x23, 0x7, 0x0, 0x7}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:36:55 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) msgget(0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x0) 04:36:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) dup3(r1, r0, 0x0) 04:36:56 executing program 5: semget(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x100000000000007, 0x0, &(0x7f0000000040)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) io_setup(0x10001, &(0x7f00000011c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000001680)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x14, 0x0, 0x300, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40081}, 0x10) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") io_submit(r0, 0x2, &(0x7f0000001400)=[&(0x7f0000001280)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0]) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") 04:36:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x74, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d7874470165"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003454c28e4b71259db"}}, 0x0, 0xd8}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:56 executing program 4: socket$unix(0x1, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8}) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x400) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) io_setup(0x10001, &(0x7f00000011c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(r2, 0x0, 0x10) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") io_submit(r0, 0x1, &(0x7f0000001400)=[&(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, &(0x7f0000001380)='R', 0x1, 0x8}]) dup(0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") 04:36:56 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 04:36:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) dup3(r1, r0, 0x0) 04:36:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7fffffffd, 0x0, 0x20000001}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754ddea420fae9972b571112d02") 04:36:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x4caa}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:57 executing program 4: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'\x01\x00\x00\x00\x01\x00\x00\x00\xcdl4\xc9s\x80\xec\xb8', {0x2, 0x0, @multicast2}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:36:57 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000440)='./file1\x00') r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 04:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x95, 0x0, 0x0, 0x0, 0x10001}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:00 executing program 2: 04:37:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xff, 0x0, 0x2, 0x0, 0x7, 0x20, 0x7}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:37:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1ff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:37:00 executing program 4: 04:37:00 executing program 1: 04:37:00 executing program 0: 04:37:00 executing program 1: 04:37:01 executing program 4: 04:37:01 executing program 2: 04:37:01 executing program 0: 04:37:01 executing program 4: 04:37:01 executing program 1: 04:37:01 executing program 2: 04:37:02 executing program 5: 04:37:02 executing program 4: 04:37:02 executing program 2: 04:37:02 executing program 1: 04:37:02 executing program 0: 04:37:02 executing program 3: 04:37:02 executing program 1: 04:37:02 executing program 5: 04:37:02 executing program 3: 04:37:02 executing program 0: 04:37:02 executing program 2: 04:37:02 executing program 5: 04:37:02 executing program 4: 04:37:02 executing program 1: 04:37:02 executing program 3: 04:37:03 executing program 5: 04:37:03 executing program 4: 04:37:03 executing program 1: 04:37:03 executing program 2: 04:37:03 executing program 0: 04:37:03 executing program 3: 04:37:03 executing program 4: 04:37:03 executing program 5: 04:37:03 executing program 1: 04:37:03 executing program 2: 04:37:03 executing program 3: 04:37:03 executing program 0: 04:37:04 executing program 4: 04:37:04 executing program 1: 04:37:04 executing program 3: 04:37:04 executing program 0: 04:37:04 executing program 2: 04:37:04 executing program 0: 04:37:04 executing program 5: 04:37:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/route\x00X\xf8\x8b\xa3\x8e\xae\xc8\xf7\xd4\x87\xfc\x80\x05\x02\xa3\x88\x0f\r\x00\xd3\x8e\xd2s\x88\xaaK\x90U\a%\xc8\xe9\xe9\xd5\xa2Q\xbf\x19\xe8u\xbc/\xfd_\xea\x0f`\x18Az52\xacl\xdef\x03\x8c\b\x02\xc5\x97M3\xa9\xf8') read$FUSE(r0, &(0x7f0000000200), 0x1000) 04:37:04 executing program 2: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x7fffffff}, 0x8) ioctl$TCSETS(r0, 0x40045431, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x74eda5c2}) 04:37:04 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='#! .'], 0x4) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', &(0x7f0000000200), 0x0, 0x1000) 04:37:04 executing program 0: 04:37:04 executing program 4: 04:37:04 executing program 3: 04:37:05 executing program 5: 04:37:05 executing program 2: 04:37:05 executing program 3: 04:37:05 executing program 0: 04:37:05 executing program 1: 04:37:05 executing program 3: 04:37:05 executing program 4: 04:37:05 executing program 0: 04:37:05 executing program 5: 04:37:05 executing program 1: 04:37:06 executing program 2: 04:37:06 executing program 3: 04:37:06 executing program 0: 04:37:06 executing program 1: 04:37:06 executing program 4: 04:37:06 executing program 3: 04:37:06 executing program 5: 04:37:06 executing program 2: 04:37:06 executing program 0: 04:37:06 executing program 1: 04:37:06 executing program 3: 04:37:06 executing program 2: 04:37:07 executing program 4: 04:37:07 executing program 0: 04:37:07 executing program 5: 04:37:07 executing program 4: 04:37:07 executing program 3: 04:37:07 executing program 0: 04:37:07 executing program 1: 04:37:07 executing program 3: 04:37:07 executing program 2: 04:37:07 executing program 0: 04:37:07 executing program 5: 04:37:07 executing program 4: 04:37:07 executing program 1: 04:37:08 executing program 3: 04:37:08 executing program 0: 04:37:08 executing program 2: 04:37:08 executing program 1: 04:37:08 executing program 3: 04:37:08 executing program 4: 04:37:08 executing program 2: 04:37:08 executing program 1: 04:37:08 executing program 5: 04:37:08 executing program 1: 04:37:08 executing program 0: 04:37:09 executing program 3: 04:37:09 executing program 2: 04:37:09 executing program 5: 04:37:09 executing program 1: 04:37:09 executing program 4: 04:37:09 executing program 0: 04:37:09 executing program 3: 04:37:09 executing program 1: 04:37:09 executing program 4: 04:37:09 executing program 2: 04:37:09 executing program 5: 04:37:10 executing program 4: 04:37:10 executing program 1: 04:37:10 executing program 0: 04:37:10 executing program 3: 04:37:10 executing program 1: 04:37:10 executing program 2: 04:37:10 executing program 5: 04:37:10 executing program 3: 04:37:10 executing program 4: 04:37:10 executing program 1: 04:37:10 executing program 2: 04:37:10 executing program 0: 04:37:11 executing program 3: 04:37:11 executing program 1: 04:37:11 executing program 5: 04:37:11 executing program 2: 04:37:11 executing program 0: 04:37:11 executing program 4: 04:37:11 executing program 3: 04:37:11 executing program 1: 04:37:11 executing program 4: 04:37:11 executing program 0: 04:37:11 executing program 3: 04:37:11 executing program 5: 04:37:11 executing program 2: 04:37:12 executing program 4: 04:37:12 executing program 1: 04:37:12 executing program 0: 04:37:12 executing program 2: 04:37:12 executing program 3: 04:37:12 executing program 4: 04:37:12 executing program 1: 04:37:12 executing program 0: 04:37:12 executing program 3: 04:37:12 executing program 5: 04:37:12 executing program 4: 04:37:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x80, 0x1, 0x8000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fe, 0x0, 0x1, 0x0, 0x10002, 0x5}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734edbe04a460f3038082e67660f50e900004681e40000010068e131feabc4aba39d6c450754c4a1fd7f6500420fae9972b571112d02") 04:37:13 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x501000, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7}, 0x7) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rdma'}]}, 0x6) 04:37:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fremovexattr(0xffffffffffffffff, 0x0) fchown(r0, 0x0, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) 04:37:13 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x143042, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) write$P9_RLOCK(r0, 0x0, 0x0) 04:37:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() timer_create(0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @empty}}}, 0x90) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x1000000000016) 04:37:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x3ff, 0x3f7) r2 = socket$packet(0x11, 0x2, 0x300) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc5f123c123f319bd070") recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080), 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 04:37:13 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x3, 0x1c) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000a00)=ANY=[@ANYRESOCT], 0x17) sendto$inet(r3, 0x0, 0x0, 0xc000, &(0x7f0000000200)={0x2, 0x4e23}, 0x10) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000a40)=0x2, 0x4) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) [ 620.838752] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 620.894165] protocol 88fb is buggy, dev hsr_slave_0 [ 620.901124] protocol 88fb is buggy, dev hsr_slave_1 04:37:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') io_submit(0x0, 0x0, 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x0) 04:37:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffffd) 04:37:14 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) semget$private(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) syncfs(0xffffffffffffffff) dup3(r0, r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'nq\x00'}, 0x2c) 04:37:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x00~WMz]\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4%\xef\x93\xb4D\xc5\xa7\x8d\x01\xe6\x18\xff>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x82\xbbw)6d\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\x00\x00x\"m\a\xe6:\bE\x96~\x0e\xe8Y\xbbn\x0f0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 04:37:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) connect$netlink(r0, &(0x7f0000000280)=@proc, 0xc) 04:37:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0}) 04:37:15 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendfile(0xffffffffffffffff, r1, &(0x7f00000003c0), 0x0) 04:37:15 executing program 3: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:15 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x2, 0x0, 0x0) 04:37:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x990, 0x0, 0x5, 0x0, 0x27}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x40000000002) fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x0, 0x7417}) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000140)={0x8, "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", 0x1000}, 0xa80) 04:37:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) sendfile(r0, r0, 0x0, 0x102000000) 04:37:15 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendfile(0xffffffffffffffff, r1, &(0x7f00000003c0), 0x0) 04:37:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003db, 0x0, 0x0, 0x23, 0x99, 0x1}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:37:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/130, 0x82}], 0x1) 04:37:16 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendfile(0xffffffffffffffff, r1, &(0x7f00000003c0), 0x0) 04:37:16 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f00000002c0), 0x4) 04:37:16 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000002e80)=0x214, 0x4) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x3fff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000440), 0x164) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x4000001) 04:37:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/130, 0x82}], 0x1) 04:37:17 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendfile(0xffffffffffffffff, r1, &(0x7f00000003c0), 0x0) 04:37:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_1\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) 04:37:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000400)='xV', 0x2, 0x50, 0x0, 0x0) 04:37:17 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 04:37:18 executing program 3: 04:37:18 executing program 0: 04:37:18 executing program 5: 04:37:18 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000003c0), 0x0) 04:37:18 executing program 2: 04:37:18 executing program 0: 04:37:18 executing program 5: 04:37:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:18 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r1, &(0x7f00000003c0), 0x0) 04:37:18 executing program 2: 04:37:18 executing program 5: 04:37:18 executing program 3: 04:37:18 executing program 0: 04:37:19 executing program 5: 04:37:19 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:19 executing program 0: 04:37:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="1800080000000000"], 0x0, 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 04:37:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) set_thread_area(0x0) 04:37:19 executing program 2: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000005be, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x100000001}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:19 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x15, 0x10000000000002, 0x0, 0x0, 0x2}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x3, 0x10000000000002, 0x0, 0x2, 0x25a6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:20 executing program 4: socket$inet(0x2, 0x3, 0x2) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, &(0x7f00000003c0), 0x0) 04:37:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x3, 0x10000000000002, 0x0, 0x2}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:21 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, &(0x7f00000003c0), 0x0) 04:37:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd4(0xffffffffffffffff, 0x0, 0x200, 0x4000000000003) 04:37:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5bb, 0x0, 0x0, 0x0, 0x0, 0x9, 0xa89c}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x9, 0x9, 0x7f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:21 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, &(0x7f00000003c0), 0x0) 04:37:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xfe}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x25a5}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:22 executing program 4: pipe(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket(0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x8000000000000014) wait4(0x0, 0x0, 0x0, 0x0) 04:37:22 executing program 5: socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") connect$inet6(0xffffffffffffffff, 0x0, 0x0) 04:37:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) close(r0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:23 executing program 4: pipe(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:23 executing program 4: pipe(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:23 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)="66630742f393d871aef086932600b2d05e313fe41c", 0x15}, 0x68) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:23 executing program 4: pipe(&(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x10, 0x2, 0xc) write(r1, 0x0, 0x0) close(r1) 04:37:24 executing program 4: pipe(&(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:24 executing program 2: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x0, @broadcast}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:25 executing program 0: ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000000)=ANY=[@ANYBLOB="001b5ec819726844c09c03003acd1d8b7a1857"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x10, 0x2, 0xc) write(r1, 0x0, 0x0) close(r1) 04:37:25 executing program 4: pipe(&(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) 04:37:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) 04:37:25 executing program 2: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x0, @broadcast}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:25 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 04:37:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x800, 0x0, 0x1000000000000004, 0x8, 0x0, 0x9, 0x7f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:26 executing program 4: ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000000)=ANY=[@ANYBLOB="97f9436e36295f21c09c03003acd1d8b211857"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb7, 0x0, 0x16, 0x0, 0x0, 0xfffffffffffffffe, 0x25a5}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:27 executing program 0: socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x19, 0x10000000000002, 0x0, 0xfffffffffffffffe, 0x25a6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:27 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)="66630742f393d871aef086932600b2d05e313f", 0x13}, 0x68) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f0000000040)="c4827d5a6e0df3e1005e57c3c3e2c99c9cd9917356424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:28 executing program 0: ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000000)=ANY=[@ANYBLOB="97f9436e36295f21c09c03003acd1d8b21"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x20000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) select(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x3, 0xfffffffffffffff9, 0x7, 0x1, 0x10000, 0x9, 0x6}, &(0x7f0000000200)={0x0, 0x7530}) 04:37:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:28 executing program 4: clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x26) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:37:29 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)="66630742f393d871aef086932600b2d05e313fe4", 0x14}, 0x68) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") init_module(&(0x7f0000000000)='posix_acl_accessGPL\x00', 0x14, 0x0) 04:37:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$packet(r1, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) 04:37:29 executing program 4: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x18, 0x0, 0x0, 0x3}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x25a6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 04:37:30 executing program 2: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'lapb0\x00\x00\x00\xcdl4\xc9s\x80\xec\xb8', {0x2, 0xfffffffffffffffe, @multicast2}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:30 executing program 3: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000005be, 0x0, 0xe, 0xfffffffffffffffa, 0xfffffffffffffff7}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x800, 0x0, 0x1000000000000004, 0x8, 0x0, 0xd441, 0x4d80}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7ff, 0x0, 0x19, 0x0, 0x0, 0x556}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:30 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x800, 0x0, 0x1000000000000004, 0x8, 0x0, 0x0, 0x7f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:31 executing program 3: request_key(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0xffffffffffffffff) 04:37:31 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7ff, 0x0, 0x19, 0x0, 0x0, 0x556, 0x20025a6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:32 executing program 0: socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000005be, 0x0, 0x3, 0xfffffffffffffffa}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fd, 0x0, 0x14, 0x0, 0x0, 0xffffffffffffffff, 0x4}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:32 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0) 04:37:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x7ffff000) 04:37:32 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:32 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffd) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'bond0\x00'}, 0x18) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000140)={0x2, 0x100}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) socket(0x1e, 0x4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000540), 0x8) clone(0x102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0xa06, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, &(0x7f0000000000), &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000009000000000000000000697036746e6c300000000000000000007465716c3000000000000000000000006272696467655f736c6176655f3100006272696467655f736c6176655f3100000180c2000000000000000000aaaaaaaaaaaa0000000000000000100900003809000080090000616d6f6e670000000000000000000000000000000000000000000000000000007c08000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa6bf2cc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000007f0000010000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000ac1414bb0000000000000000000000000000000000000000000000000000000000000000e0000001726564697265637400000000000000000000000000000000000000000000000004000000000000006c6f67000000000000000000000000000000000000000000000000000000000024000000001f9bf16029c6f67d33397ab27cb70202980708693b59969ffe29b1186b14000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0xa7e) 04:37:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d79f0000000000000000000000000000", 0x10) [ 640.090732] kernel msg: ebtables bug: please report to author: entries_size too small [ 640.236439] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:33 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) 04:37:33 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:33 executing program 4: 04:37:33 executing program 3: [ 640.683055] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:33 executing program 0: 04:37:33 executing program 4: 04:37:34 executing program 3: 04:37:34 executing program 2: [ 641.235289] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:34 executing program 0: 04:37:34 executing program 4: 04:37:34 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:34 executing program 0: 04:37:34 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:34 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:34 executing program 3: 04:37:34 executing program 2: [ 641.919518] kernel msg: ebtables bug: please report to author: entries_size too small [ 641.973126] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:35 executing program 0: 04:37:35 executing program 2: 04:37:35 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:35 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:35 executing program 0: 04:37:35 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:35 executing program 2: 04:37:35 executing program 3: [ 642.926533] kernel msg: ebtables bug: please report to author: entries_size too small [ 642.998130] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:36 executing program 0: 04:37:36 executing program 2: 04:37:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:36 executing program 3: 04:37:36 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:36 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:36 executing program 2: 04:37:36 executing program 0: 04:37:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 643.905488] kernel msg: ebtables bug: please report to author: entries_size too small [ 643.923771] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:37 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:37 executing program 0: 04:37:37 executing program 2: 04:37:37 executing program 3: [ 644.436850] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:37 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) 04:37:37 executing program 0: 04:37:37 executing program 2: [ 644.735350] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:37 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:37 executing program 3: 04:37:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 645.056659] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:38 executing program 2: 04:37:38 executing program 0: 04:37:38 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) 04:37:38 executing program 3: 04:37:38 executing program 2: 04:37:38 executing program 0: 04:37:38 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7000000000000, 0x400) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:38 executing program 3: 04:37:39 executing program 0: 04:37:39 executing program 2: [ 645.933227] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 646.074338] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:39 executing program 0: 04:37:39 executing program 2: 04:37:39 executing program 3: 04:37:39 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) 04:37:39 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:39 executing program 0: 04:37:39 executing program 3: 04:37:39 executing program 2: [ 646.864954] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:40 executing program 0: 04:37:40 executing program 3: [ 646.945635] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:40 executing program 2: 04:37:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(0x0, 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:40 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) socket$xdp(0x2c, 0x3, 0x0) 04:37:40 executing program 0: 04:37:40 executing program 2: 04:37:40 executing program 3: 04:37:40 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(0x0, 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 647.644914] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:40 executing program 0: 04:37:41 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 647.992242] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(0x0, 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x49e}) 04:37:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x100, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000980)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 04:37:41 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) 04:37:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:41 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 648.663798] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:41 executing program 3: r0 = getpgid(0x0) capget(&(0x7f0000000180)={0x20071026, r0}, &(0x7f00000001c0)) 04:37:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, 0x0) [ 648.904527] kernel msg: ebtables bug: please report to author: entries_size too small [ 649.048197] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 04:37:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:42 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) 04:37:42 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) 04:37:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/111, 0x6f}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)=@l2, 0x3c, &(0x7f00000006c0)=[{&(0x7f0000000740)=""/158, 0x1f6}], 0x0, &(0x7f0000000500)=""/134, 0xffffffba}, 0x0) close(r1) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0), 0x21f, &(0x7f0000001580)=[{0x18, 0x1, 0x1}], 0x18}, 0x0) [ 649.377282] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:42 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:37:42 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 04:37:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002d99e3b81c0549cd91b9d9b9591510d0"], 0x0, 0x12}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x8, 0x4c8f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x28, 0x0, {"595dcd3a38152bb0c7e9f23139"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101"}}, 0x0, 0x61}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 649.994376] kernel msg: ebtables bug: please report to author: entries_size too small [ 650.106183] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:37:43 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) 04:37:43 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34}, 0x10) [ 650.773488] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 650.874086] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002d89634d22fc7b8061a163154fa5938bf0"], 0x0, 0x13}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:44 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34}, 0x10) [ 651.283295] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fb, 0x0, 0x11, 0xfb2}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:37:44 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) 04:37:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x437b2e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={0x0, 0x194, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 04:37:44 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34}, 0x10) [ 651.698287] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 652.042118] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:45 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x8000a, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x437b2e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={0x0, 0x194, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) [ 652.244548] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:37:45 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)) [ 652.352268] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 652.567277] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:45 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) [ 653.013413] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 653.267674] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:37:46 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) [ 653.495504] kernel msg: ebtables bug: please report to author: entries_size too small 04:37:46 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) [ 653.803371] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:37:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 654.064552] kernel msg: ebtables bug: please report to author: entries_size too small [ 657.662681] device bridge_slave_1 left promiscuous mode [ 657.668575] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.716168] device bridge_slave_0 left promiscuous mode [ 657.722242] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.304355] IPVS: ftp: loaded support on port[0] = 21 [ 664.565789] device hsr_slave_1 left promiscuous mode [ 664.619327] device hsr_slave_0 left promiscuous mode [ 664.681529] team0 (unregistering): Port device team_slave_1 removed [ 664.696814] team0 (unregistering): Port device team_slave_0 removed [ 664.711430] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 664.754136] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 664.880173] bond0 (unregistering): Released all slaves [ 665.116692] chnl_net:caif_netlink_parms(): no params data found [ 665.186652] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.193328] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.201986] device bridge_slave_0 entered promiscuous mode [ 665.211600] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.218651] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.230023] device bridge_slave_1 entered promiscuous mode [ 665.283190] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 665.298218] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 665.380562] team0: Port device team_slave_0 added [ 665.393513] team0: Port device team_slave_1 added [ 665.477000] device hsr_slave_0 entered promiscuous mode [ 665.532580] device hsr_slave_1 entered promiscuous mode [ 665.596596] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.603267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.610472] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.617214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.718733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 665.747618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 665.757748] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.771412] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.800170] 8021q: adding VLAN 0 to HW filter on device team0 [ 665.821027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 665.830052] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.836722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.887545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 665.896018] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.902681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.913430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 665.926765] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 665.953262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 665.985589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 666.029877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 666.040568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 666.074034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 666.169056] 8021q: adding VLAN 0 to HW filter on device batadv0 04:38:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fb, 0x0, 0x11, 0xfb2}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:00 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) 04:38:00 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x437b2e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={0x0, 0x194, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 04:38:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fe, 0x0, 0x2, 0x8, 0x0, 0xc, 0x4000}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734edbe04a460f3038082e67660f50e900004681e40000010068e131feabc4aba39d6c450754c4a1fd7f6500420fae9972b571112d02") 04:38:00 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x1, 0x0, 0x34, r5}, 0x10) [ 667.335093] kernel msg: ebtables bug: please report to author: entries_size too small [ 667.387519] kernel msg: ebtables bug: please report to author: entries_size too small [ 667.413744] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:38:00 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fe, 0x0, 0x4, 0x2, 0x0, 0x3}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734edbe04a460f3038082e67660f50e900004681e40000010068e131feabc4aba39d6c450754c4a1fd7f6500420fae9972b571112d02") 04:38:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x5c63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x1) flock(r0, 0x2) 04:38:01 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x1, 0x0, 0x34, r5}, 0x10) 04:38:01 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:01 executing program 3: 04:38:01 executing program 2: 04:38:01 executing program 3: [ 668.443803] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:01 executing program 3: 04:38:01 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:01 executing program 0: 04:38:02 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x1, 0x0, 0x34, r5}, 0x10) 04:38:02 executing program 2: 04:38:02 executing program 1: 04:38:02 executing program 0: [ 669.333376] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:02 executing program 3: 04:38:02 executing program 2: 04:38:02 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:02 executing program 3: 04:38:02 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 669.989787] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:03 executing program 1: [ 670.042301] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:03 executing program 3: 04:38:03 executing program 0: 04:38:03 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:03 executing program 2: 04:38:03 executing program 3: 04:38:03 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 670.522491] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:03 executing program 1: 04:38:03 executing program 0: [ 670.728788] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:03 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:03 executing program 3: 04:38:04 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) 04:38:04 executing program 2: 04:38:04 executing program 1: [ 671.183473] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:04 executing program 3: [ 671.313589] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:04 executing program 0: 04:38:04 executing program 1: 04:38:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1, 0x10001, 0x1f}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:04 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3ff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) geteuid() syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4c8e}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:05 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 672.180435] kernel msg: ebtables bug: please report to author: entries_size too small [ 672.311325] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:05 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:05 executing program 1: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0xe, 0x0, 0xc46f, 0x0, 0x1ff}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:05 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 672.902916] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fb, 0x0, 0x0, 0xfb2, 0x3}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:06 executing program 0: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4db9}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 673.150333] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:06 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) 04:38:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0x4c8e}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 673.662404] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:06 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) 04:38:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 673.957672] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:07 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) 04:38:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x0, 0x0, 0x7d, 0x4}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000694e4200006f8a26045d0f92c10eee31"], 0x0, 0x12}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:07 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x80000003dc}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 674.430275] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:07 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) [ 674.624050] kernel msg: ebtables bug: please report to author: entries_size too small [ 674.770140] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:07 executing program 4: pipe(&(0x7f0000000700)) socket$alg(0x26, 0x5, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:07 executing program 1: mknod(&(0x7f0000000140)='./file1\x00', 0x88, 0x0) syz_execute_func(&(0x7f0000000180)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132315) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, 0x0, 0x0) [ 675.036613] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:08 executing program 4: pipe(&(0x7f0000000700)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:08 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:08 executing program 3: mknod(&(0x7f0000000140)='./file1\x00', 0x88, 0x0) syz_execute_func(&(0x7f0000000180)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132315) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 04:38:08 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ftruncate(0xffffffffffffffff, 0x13153ef8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syncfs(0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x800) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fdatasync(r0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 675.478853] kernel msg: ebtables bug: please report to author: entries_size too small [ 675.582919] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0xc, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x18) 04:38:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:09 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x18, &(0x7f0000000140), 0x4) 04:38:09 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 676.039371] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:09 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:09 executing program 3: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 04:38:09 executing program 1: [ 676.351766] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:09 executing program 2: 04:38:09 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) 04:38:09 executing program 0: 04:38:09 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r3}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x1, r4, 0x34, r5}, 0x10) 04:38:09 executing program 3: 04:38:10 executing program 1: [ 677.052657] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:10 executing program 2: 04:38:10 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) 04:38:10 executing program 0: 04:38:10 executing program 1: 04:38:10 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r3}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x1, r4, 0x34, r5}, 0x10) 04:38:10 executing program 3: 04:38:10 executing program 2: 04:38:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x253) 04:38:10 executing program 1: [ 677.915708] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:11 executing program 3: 04:38:11 executing program 0: 04:38:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x253) 04:38:11 executing program 1: 04:38:11 executing program 2: 04:38:11 executing program 3: 04:38:11 executing program 0: 04:38:11 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r3}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r5, &(0x7f0000000100)={0x2c, 0x1, r4, 0x34, r5}, 0x10) 04:38:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x253) 04:38:11 executing program 3: 04:38:12 executing program 1: 04:38:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0}, 0x253) [ 678.982896] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:12 executing program 2: 04:38:12 executing program 0: 04:38:12 executing program 3: [ 679.308263] kernel msg: ebtables bug: please report to author: Wrong len argument 04:38:12 executing program 3: 04:38:12 executing program 0: 04:38:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0}, 0x253) 04:38:12 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e00000015008100a00f80ecdb4cb904024865160b020000d4126efb120003000800da1b40d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 679.673086] kernel msg: ebtables bug: please report to author: Wrong len argument 04:38:12 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x10008, 0x0, 0x0, 0x3, 0x1, 0x0, 0x100}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:12 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r4}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r6, &(0x7f0000000100)={0x2c, 0x1, r5, 0x34, r6}, 0x10) 04:38:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x28, 0x0, {"595dcd3a38152bb0c7e9f23139"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c"}}, 0x0, 0x4c}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0xd, 0x0, 0x7d, 0x4}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0}, 0x253) [ 680.095469] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 680.165533] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 680.276400] kernel msg: ebtables bug: please report to author: Wrong len argument [ 680.306089] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0xd, 0x0, 0x9, 0x800008}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x78) 04:38:13 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r4}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r6, &(0x7f0000000100)={0x2c, 0x1, r5, 0x34, r6}, 0x10) [ 680.752473] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 681.042676] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x38, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c"}}, {0x0, "ebc549cc83c87b"}}, 0x0, 0x41}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x78) 04:38:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xffffffffffffff25, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) recvmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) [ 681.389627] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:38:14 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x10, r0) ptrace(0x11, r0) 04:38:14 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r4}) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r6, &(0x7f0000000100)={0x2c, 0x1, r5, 0x34, r6}, 0x10) [ 681.488981] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.498907] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. 04:38:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080)="1d", 0x0}, 0x18) [ 681.606230] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. 04:38:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x78) [ 681.728775] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.797600] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.807023] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.905662] kernel msg: ebtables bug: please report to author: entries_size too small [ 681.927642] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.957121] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:38:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x10, &(0x7f0000000300)={0xa, 0x4e24, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @rand_addr="ae99a270a138db4ce060b1098846e515", 0xff}, 0x1c) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0) 04:38:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]}, 0x78) 04:38:15 executing program 3: mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x7b, 0x0, 0x0) [ 682.221436] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:38:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0}, 0x18) 04:38:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x4, 0x70, 0xff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "ebc549cc83c87beb59ee222baa"}}, 0x0, 0x27}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]}, 0x78) 04:38:15 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) 04:38:15 executing program 3: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xc471, 0x0, 0x800003ff}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x34, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a"}}, 0x0, 0x59}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 682.926053] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 683.102239] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]}, 0x78) 04:38:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x618, 0x0, 0x0, 0x0, 0x8, 0x0, 0x40}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 683.510638] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:38:16 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) 04:38:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x0, 0x23, 0x0, 0x4, 0xfffffffffffffffd}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xee, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede041"]}, 0x166) [ 683.931766] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:17 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:17 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:17 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 684.379401] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xee, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede041"]}, 0x166) [ 684.657174] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:17 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:17 executing program 1: r0 = socket$kcm(0xa, 0x122000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000500)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 04:38:18 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 684.933079] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 04:38:18 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:18 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x101000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1000000000003, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 685.176335] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xee, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede041"]}, 0x166) 04:38:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0x4c8f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 685.486889] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:18 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:18 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x165, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e"]}, 0x1dd) 04:38:18 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:18 executing program 1: 04:38:19 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 686.004262] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:19 executing program 1: [ 686.156287] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:19 executing program 1: 04:38:19 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:38:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:19 executing program 3: 04:38:19 executing program 1: 04:38:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xef, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a"]}, 0x167) 04:38:19 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:20 executing program 3: 04:38:20 executing program 1: [ 687.084430] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:20 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 687.400771] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:20 executing program 3: 04:38:20 executing program 1: 04:38:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xef, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a"]}, 0x167) 04:38:20 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:38:20 executing program 1: [ 687.848792] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:21 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xef, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a"]}, 0x167) 04:38:21 executing program 3: 04:38:21 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:21 executing program 1: [ 688.338724] kernel msg: ebtables bug: please report to author: entries_size too small [ 688.348368] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:21 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:21 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='#e\xa7\x82w$\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) 04:38:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x12a, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x1a2) 04:38:21 executing program 3: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='#e\xa7\x82w$\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) fgetxattr(r0, 0x0, 0x0, 0x0) 04:38:21 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:38:22 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:22 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$inet(r1, 0x0, 0x0, 0x0) [ 689.155225] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x12a, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x1a2) 04:38:22 executing program 1: rt_sigaction(0x3c, &(0x7f0000000200)={0x0, {}, 0x0, 0x0}, &(0x7f00000002c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000300)) [ 689.441013] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x4, 0x2, 0x6, 0x81, 0x400}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:22 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:22 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xef, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a"]}, 0x167) [ 689.807949] kernel msg: ebtables bug: please report to author: entries_size too small [ 689.838841] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clock_gettime(0x0, &(0x7f0000000040)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r1}) 04:38:23 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:23 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:23 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:23 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xef, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a"]}, 0x167) 04:38:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002d89634d22fc7b8061a16335cea5488bf037b2"], 0x0, 0x15}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 690.670582] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xef, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a"]}, 0x167) 04:38:24 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x70, 0xff, 0x0, 0x6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:24 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:24 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 691.052669] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:24 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x10d, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d7"]}, 0x185) 04:38:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:24 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 691.680028] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:24 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x80003ff, 0x0, 0x0, 0xe0, 0x0, 0x43}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xf0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27"]}, 0x168) 04:38:25 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:25 executing program 3: socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200805c, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:25 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) 04:38:25 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 692.682866] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xf0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27"]}, 0x168) 04:38:26 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:26 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 693.346181] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x0, 0x33, 0x0, 0x4}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:26 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xf0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27"]}, 0x168) 04:38:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x0, 0x23, 0x7, 0x0, 0x3}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:27 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) 04:38:27 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 694.069103] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6"]}, 0x177) 04:38:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:27 executing program 1: 04:38:27 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 694.613187] kernel msg: ebtables bug: please report to author: entries_size too small [ 694.816814] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:27 executing program 1: 04:38:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:28 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x177) 04:38:28 executing program 3: 04:38:28 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:28 executing program 1: 04:38:28 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 695.372110] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:28 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 695.625146] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x177) 04:38:28 executing program 1: 04:38:28 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 695.973127] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:29 executing program 1: 04:38:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x106, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca206299"]}, 0x17e) 04:38:29 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:29 executing program 3: 04:38:29 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:29 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 696.424340] kernel msg: ebtables bug: please report to author: entries_size too small [ 696.689925] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:29 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:29 executing program 3: 04:38:29 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x177) 04:38:30 executing program 1: 04:38:30 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 697.223169] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:30 executing program 3: 04:38:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x177) 04:38:30 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:30 executing program 1: 04:38:30 executing program 3: [ 697.815943] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:31 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 697.913558] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:31 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x2, 0x0, 0x0, 0x20}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x177) 04:38:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x10008, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:31 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 698.540563] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:31 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:31 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:31 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 698.945990] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x103, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x17b) 04:38:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffffffffffa}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 699.283267] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:32 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:32 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:32 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x100, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x178) 04:38:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffffe}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 699.813441] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:33 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 700.036241] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:33 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:33 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xfd, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x175) 04:38:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x2, 0x23, 0x0, 0x20}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") [ 700.671504] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:33 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:33 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 700.873427] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}, {0x0, "ebc549"}}, 0x0, 0x1d}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:34 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xfd, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x175) 04:38:34 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:34 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:34 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x2, 0x23, 0x7, 0x0, 0x3}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") [ 701.694403] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xfd, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x175) [ 701.917996] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:35 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e6c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:35 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 702.346224] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:35 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x177) 04:38:35 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x10008, 0x0, 0x11, 0x0, 0x0, 0x0, 0xfe}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 702.834460] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6"]}, 0x177) 04:38:36 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:36 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 703.569560] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x618, 0x0, 0x0, 0x0, 0x0, 0x511, 0x8}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 703.815237] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xff, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6"]}, 0x177) 04:38:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x70, 0x9}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:37 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:37 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 704.192555] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:37 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x10008, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfc}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:37 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 704.597705] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:37 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:38 executing program 1: 04:38:38 executing program 3: 04:38:38 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:38 executing program 1: 04:38:38 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:38 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:38 executing program 3: 04:38:38 executing program 1: [ 705.669170] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:38 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:39 executing program 4: 04:38:39 executing program 1: 04:38:39 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:39 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:39 executing program 3: 04:38:39 executing program 4: 04:38:39 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) [ 706.577203] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:39 executing program 1: 04:38:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:40 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:40 executing program 3: 04:38:40 executing program 1: [ 707.152685] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:40 executing program 4: 04:38:40 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:40 executing program 1: 04:38:40 executing program 4: 04:38:40 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:40 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:40 executing program 3: 04:38:40 executing program 1: 04:38:41 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 707.904470] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:41 executing program 4: 04:38:41 executing program 4: 04:38:41 executing program 1: 04:38:41 executing program 4: 04:38:41 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:41 executing program 3: 04:38:41 executing program 1: 04:38:41 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3735858", 0x39}], 0x1}, 0x0) 04:38:41 executing program 4: 04:38:41 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") getsockopt$inet_mreqn(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x0) 04:38:42 executing program 3: mknod(&(0x7f0000f80000)='./file0\x00', 0x8001040, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) [ 709.055788] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) rt_sigtimedwait(&(0x7f0000000500), 0x0, 0x0, 0x8) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, 0x0, 0x0) tkill(r2, 0x1000000000015) 04:38:42 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) dup2(r2, r1) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x1, "f9685c6c44ecaf6e"}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 709.560343] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:42 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:42 executing program 3: 04:38:43 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:43 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) [ 710.127105] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:43 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, 0x0, 0x0) 04:38:43 executing program 1: 04:38:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x38, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c"}}, {0x0, "ebc549cc83c87beb59ee222baa4f"}}, 0x0, 0x48}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="20002d99634d22fc998461a16335cea54a8bb6c87e"], 0x0, 0x15}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:43 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0xc, 0x1f}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734edbe04a460f3038082e67660f50e900004681e40000010068e131feabc4aba39d6c450754c4a1fd7f6500420fae9972b571112d02") 04:38:43 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:43 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, 0x0, 0x0) [ 711.146712] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:44 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, 0x0, 0x0) 04:38:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00'], 0x1) 04:38:44 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, 0x0, 0x0) 04:38:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:44 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x10000026f) gettid() getegid() read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 04:38:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x8, 0x200805c, 0x8}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:45 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:45 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, 0x0, 0x0) [ 712.247271] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:45 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, 0x0, 0x0) 04:38:45 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) 04:38:45 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002d99634d22fc998461a16335cea54a8bf002"], 0x0, 0x14}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0x4, 0x2, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 713.150491] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:46 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) 04:38:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x28, 0x0, {"595dcd3a38152bb0c7e9f23139"}}, {0x0, "ebc549cc83c87beb59ee222baa4f"}}, 0x0, 0x38}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002d9908000000b06be76700004d22079984"], 0x0, 0x13}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:46 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:46 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, 0x0}, 0x0) [ 713.784401] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:46 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) 04:38:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x618, 0x0, 0x0, 0x0, 0x8, 0x200805c, 0x6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:47 executing program 1: ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) socket$netlink(0x10, 0x3, 0x0) shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 04:38:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03400800000000000000ca1b4e7d06a6bd7c493872f750375ed08a5633d6e74703c48f93b82afb9bbc7a461eb886a5e54e8ff53144612ad5d00000", 0x4c}], 0x1}, 0x0) 04:38:47 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:47 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:47 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, 0x0}, 0x0) [ 714.783888] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x103, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000002c0)}, 0x2000000) 04:38:47 executing program 3: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000200)='vet\x00\x00\x00\x00\x00\x05\x00\x00\x02\xbdh\x00') socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000040)) 04:38:48 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:48 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x0, 0x0, 0x0, &(0x7f0000c43000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0xffffffc0, 0x2]}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$kcm(r0, &(0x7f0000000880)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000200)="f2", 0x1}], 0x1}, 0x40) [ 715.432941] : renamed from vet [ 715.447226] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:48 executing program 0: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff1, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f0000001a00)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 04:38:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x618, 0x0, 0x0, 0x0, 0x0, 0x200805c, 0x6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:48 executing program 4: 04:38:48 executing program 3: 04:38:48 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:49 executing program 4: 04:38:49 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, 0x0}, 0x0) [ 716.095433] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:49 executing program 0: 04:38:49 executing program 4: 04:38:49 executing program 3: 04:38:49 executing program 0: 04:38:49 executing program 4: 04:38:49 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:50 executing program 1: [ 716.987252] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:50 executing program 3: 04:38:50 executing program 4: 04:38:50 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)}, 0x0) 04:38:50 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:50 executing program 1: 04:38:50 executing program 0: 04:38:50 executing program 3: [ 717.750295] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:50 executing program 4: 04:38:51 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)}, 0x0) 04:38:51 executing program 3: 04:38:51 executing program 4: 04:38:51 executing program 1: 04:38:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x10, 0x0, 0xe, 0x0, 0x0, 0x0, 0x8082}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 04:38:51 executing program 5: pipe(&(0x7f0000000700)) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) 04:38:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f0000000040)="c4827d5a6e0df3e1005e57c3c3e2c9b7d98fa91097444408734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 719.138657] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:52 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)}, 0x0) 04:38:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x10, 0xfffffffffffffffa}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x38, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2"}}, 0x0, 0x56}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:52 executing program 5: pipe(&(0x7f0000000700)) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 719.995864] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0x9, 0x1ff, 0x7f}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9741, 0x400000d368}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:53 executing program 5: pipe(&(0x7f0000000700)) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r1, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r2, r3/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r5}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x1, r6, 0x34, r7}, 0x10) [ 720.714747] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0x0, 0xb, 0x0, 0x0, 0x7f}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:53 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{0x0}], 0x1}, 0x0) 04:38:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 721.343605] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:54 executing program 0: socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xc470, 0x100000002, 0x3}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x5bb, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8000000000ffe}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:55 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{0x0}], 0x1}, 0x0) [ 722.006207] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0x0, 0x100009, 0xffffffffffff0192}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4285fe05}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:55 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000140), 0x60) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60", 0x2c}], 0x1}, 0x0) [ 722.751096] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:56 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x100000000000007, 0x0, &(0x7f0000000040)) io_setup(0x10001, &(0x7f00000011c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000001680)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x14, 0x0, 0x300, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40081}, 0x10) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") io_submit(r0, 0x2, &(0x7f0000001400)=[&(0x7f0000001280)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0]) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") 04:38:56 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8}) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) io_setup(0x10001, &(0x7f00000011c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") dup(0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") 04:38:56 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{0x0}], 0x1}, 0x0) 04:38:56 executing program 5: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x0, 0x17, 0x0, 0x0, 0x200b1}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734edbe04a460f3038082e67660f50e900004681e40000010068e131feabc4aba39d6c450754c4a1fd7f6500420fae9972b571112d02") 04:38:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") ppoll(&(0x7f0000000000)=[{}, {r0, 0x240}], 0x2, &(0x7f0000000140), &(0x7f00000001c0)={0x8000}, 0x8) [ 723.685076] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x1000000000000004, 0x0, 0x0, 0x9, 0x7f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, 0x10001, 0x200000007f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:57 executing program 5: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x800000001, 0x0, 0x4d1}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3b7d95a91914e424a2664f0ff065b460f343030082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754ddea420fae9972b571112d02") 04:38:57 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)}], 0x1}, 0x0) [ 724.492715] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:57 executing program 4: r0 = memfd_create(&(0x7f0000000400)='queue1\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\xa9\x8b+\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:38:58 executing program 5: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:38:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x2, 0x3, 0xfffffffffffffffd, 0x0, 0x6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:58 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/mnt\x00') [ 725.628827] kernel msg: ebtables bug: please report to author: entries_size too small 04:38:59 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)}], 0x1}, 0x0) 04:38:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:38:59 executing program 3: socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffb, 0x6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:38:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x78, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d78744701656097dd85"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa"}}, 0x0, 0x9b}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:00 executing program 1: socket$unix(0x1, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8}) syz_open_dev$vcsn(0x0, 0x0, 0x0) semget(0x0, 0x0, 0x400) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) io_setup(0x10001, &(0x7f00000011c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(r2, 0x0, 0x10) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") io_submit(r0, 0x1, &(0x7f0000001400)=[&(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x8}]) dup(0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") 04:39:00 executing program 3: 04:39:00 executing program 3: 04:39:00 executing program 0: 04:39:39 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x143042, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0xfffffffffffffd2b) tkill(0x0, 0x1000000000016) 04:39:39 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:39 executing program 1: 04:39:39 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)}], 0x1}, 0x0) 04:39:39 executing program 3: 04:39:39 executing program 0: [ 766.401475] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_type(r6, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) 04:39:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000810000fd90a188d84b"], 0xe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:39:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000009c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000008c0), 0x12) 04:39:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x100000000000012}, 0x153) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000200)}, 0x870c6d64243b5e19) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000300)='0\x00') 04:39:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(r1, &(0x7f000000c240)={&(0x7f000000b0c0)=@xdp={0x2c, 0x0, 0x0}, 0x196, 0x0}, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)=r4) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x213}) 04:39:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_type(r6, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) 04:39:40 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:40 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e05926166", 0x1d}], 0x1}, 0x0) 04:39:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_type(r6, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) 04:39:40 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_FP_MODE(0x2d, 0x0) write$P9_RLCREATE(r1, 0x0, 0x0) [ 767.533243] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_type(r6, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) 04:39:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_type(r6, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) 04:39:41 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:41 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000), 0x2, 0x0) 04:39:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) write(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:41 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e05926166", 0x1d}], 0x1}, 0x0) [ 768.300729] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:41 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000ac5000), 0x4) close(r2) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000180)="16", 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[]}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0xffff) fcntl$addseals(r3, 0x409, 0x8) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) pipe(&(0x7f00000004c0)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340)="2400000021002551071c0165ff00", 0xe) getpgid(0x0) openat(0xffffffffffffffff, 0x0, 0x101001, 0x10) io_setup(0x10000000000000c2, &(0x7f0000000440)) 04:39:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_type(r6, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) 04:39:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_type(r6, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) 04:39:41 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) [ 769.281461] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:42 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e05926166", 0x1d}], 0x1}, 0x0) 04:39:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) syslog(0x3, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) dup3(r1, r0, 0x0) 04:39:42 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) write(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 770.093326] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) close(0xffffffffffffffff) 04:39:43 executing program 3: chdir(0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e8837", 0x2b}], 0x1}, 0x0) 04:39:43 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) write(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 04:39:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) 04:39:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffb}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 771.064237] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:44 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) syslog(0x3, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) dup3(r1, r0, 0x0) 04:39:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) [ 771.543986] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) syslog(0x3, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) dup3(r1, r0, 0x0) 04:39:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 04:39:45 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:45 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e8837", 0x2b}], 0x1}, 0x0) 04:39:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x5, 0x6, &(0x7f00000019c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xadb1, 0x0, 0x0, 0x0, 0x8}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe27}]}, &(0x7f0000001a00)='GPL\x00', 0x8, 0xc4, &(0x7f0000001a40)=""/196, 0x40f00, 0x1, [], r5, 0x5}, 0x48) 04:39:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) syslog(0x3, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) dup3(r1, r0, 0x0) 04:39:45 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) write(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) [ 772.395074] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) syslog(0x3, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) dup3(r1, r0, 0x0) 04:39:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) 04:39:45 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 773.064016] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x74, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d7874470165"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003454c28e4b71259db426f2b781ef6dddad7cb6c333f4cbc053890483ff0c07e781899993299a0289e7b5ba2f0e8efa3d1b597f6872f177969"}}, 0x0, 0x108}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4020000000001, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:46 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e8837", 0x2b}], 0x1}, 0x0) 04:39:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) 04:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="30010000ffff7627c4f977f9ffffff872c02431c3e2a"], 0x0, 0x16}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:46 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r3, 0xb, r0, 0x1) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) [ 774.128086] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r2, 0xb, r0, 0x1) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) 04:39:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0x0, 0x2, 0xfffffffffffffffc, 0x9}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r2, 0xb, r0, 0x1) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x8) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000780)=""/91, 0x5b}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000800)=""/140, 0x8c}], 0x7, &(0x7f0000000940)=""/4096, 0x1000}, 0x0) 04:39:47 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b8", 0x32}], 0x1}, 0x0) 04:39:47 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x7c, 0x0, {"595dcd3a38152bb0c7e9f2313944ff7ab5e49733e2f173587e546a103c6d28d4a2a2bf9fa38968d27883f3b0c9e1ba61daa35392d749aad468d15504832ccced3e1de629dadef1cfa8cb92caca328ad3ea19ae1d78744701656097dd85293b07ce"}}, {0x0, "ebc549cc83c87beb59ee222baa4fe198b05111d6ee5a7e1017d965a2b31546e0fa0c6a7dc22a33a06588e20c7cb569180dc8b31ba12101fcacc1cd8e7ccc7bae337dcb12e4c0e114f6eb28b0be876284cb366e1fd7ee82a07003454c28e4b71259db426f2b781ef6dddad7cb6c33"}}, 0x0, 0xec}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:48 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)={0xfffffffffffffff7, 0x5}) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x5) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000200)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x300000000000000}) write$P9_RLINK(r0, &(0x7f0000000280)={0x7}, 0x7) 04:39:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r2, 0xb, r0, 0x1) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) perf_event_open(&(0x7f00000004c0)={0x100000, 0x70, 0x7fffffff, 0x800, 0x1ff, 0x93e, 0x0, 0x3, 0x43f, 0x1, 0x6, 0x0, 0x80000000, 0x0, 0xdff4, 0xffffffffffffffff, 0x4, 0x5, 0x924, 0x14, 0x0, 0x401, 0x2, 0x7400000, 0x80000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0xed3, 0xffffffffffff18a3, 0xff, 0x10, 0x7fff, 0x1ff, 0x8, 0x0, 0xfffffffffffffff9, 0x4, @perf_config_ext={0x81, 0x80000001}, 0x9, 0xff, 0x9, 0x0, 0x4, 0x10000, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x8) [ 775.185459] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r2, 0xb, r0, 0x1) gettid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x8001, 0x0}, 0x20) 04:39:48 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/117, 0x75) 04:39:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x890b, &(0x7f0000000040)) 04:39:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCGIFBR(r0, 0xc0045878, 0x0) 04:39:48 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:48 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b8", 0x32}], 0x1}, 0x0) 04:39:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r2, 0xb, r0, 0x1) gettid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) 04:39:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r1, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x3fb}}, 0x0) 04:39:49 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000015c0), 0x0) [ 776.150722] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:49 executing program 1: 04:39:49 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r2, 0xb, r0, 0x1) gettid() 04:39:49 executing program 4: 04:39:49 executing program 3: [ 777.036639] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:50 executing program 1: 04:39:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x5, 0x70, 0x9, 0x6, 0xffffffffffffff81, 0x9ee, 0x0, 0x6, 0x4000, 0x4, 0xffffffff, 0x1, 0xfffffffffffffd77, 0x3, 0x0, 0x8000, 0x10001, 0x1, 0xed13, 0x3, 0x7ff, 0x5, 0x9a34, 0x7, 0x400, 0x5a, 0x10000, 0x400, 0x1, 0xb2ef, 0x80000001, 0x5, 0x2, 0x9, 0x8, 0x9, 0x5, 0x7, 0x0, 0xfff, 0x3, @perf_bp={&(0x7f0000000440), 0x2}, 0xa00, 0x10000, 0x59, 0x9, 0x329f, 0x7, 0x4}, r2, 0xb, r0, 0x1) 04:39:50 executing program 3: 04:39:50 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b8", 0x32}], 0x1}, 0x0) 04:39:50 executing program 3: 04:39:50 executing program 4: 04:39:50 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 04:39:51 executing program 3: 04:39:51 executing program 1: 04:39:51 executing program 4: [ 778.297591] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:51 executing program 4: 04:39:51 executing program 1: 04:39:51 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3", 0x36}], 0x1}, 0x0) 04:39:51 executing program 3: 04:39:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/.yz0\x00', 0x1ff) 04:39:51 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:51 executing program 4: 04:39:52 executing program 1: [ 779.241612] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:52 executing program 4: 04:39:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:52 executing program 3: 04:39:52 executing program 1: 04:39:52 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3", 0x36}], 0x1}, 0x0) 04:39:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:52 executing program 4: 04:39:52 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:53 executing program 3: 04:39:53 executing program 4: 04:39:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) [ 780.277368] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:53 executing program 1: 04:39:53 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:53 executing program 4: 04:39:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:53 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb3", 0x36}], 0x1}, 0x0) 04:39:53 executing program 3: [ 780.795566] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0xfffffffffffffffd, 0x0, 0x1, 0x81}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0x2, 0x2, 0xfffffffffffffffc, 0x9}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:54 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4000000000ff, 0xd368}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 781.494580] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:54 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb37358", 0x38}], 0x1}, 0x0) 04:39:55 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000f6feff00ff194698005c11358741"], 0x0, 0x11}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 782.352764] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0xd368}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:55 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) [ 782.845629] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:56 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb37358", 0x38}], 0x1}, 0x0) 04:39:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:56 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 783.232776] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) 04:39:56 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:56 executing program 1: socket$unix(0x1, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8}) syz_open_dev$vcsn(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) io_setup(0x10001, &(0x7f00000011c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(r1, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") io_submit(0x0, 0x0, 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") [ 783.759971] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000003da, 0x0, 0x2, 0x0, 0x0, 0x10001, 0x6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="f3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53136660fd9ee6c450754e50c420fae9972b571112d02") 04:39:57 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:57 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:57 executing program 2: r0 = socket$kcm(0x10, 0x100000000002, 0x4) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000004d80)="39000000140081ae00002c000500018701546fabcae5e54f7e0592616652e285af71583c7d06a6580e883795c0c54c1960b89c40ebb37358", 0x38}], 0x1}, 0x0) 04:39:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x12, 0x2, 0x0, 0x0, 0x4285fe05}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:57 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) [ 784.467943] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7fff, 0x0, 0x3, 0x9960, 0x0, 0x0, 0x2100}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:57 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:57 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) [ 785.208208] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:58 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) open(0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), 0x4) 04:39:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x200000007f}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7fff, 0x0, 0x3, 0x9960, 0xfffffffffffffffe, 0x0, 0x2100}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:59 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:59 executing program 1: socket$unix(0x1, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8}) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x400) io_setup(0x10001, &(0x7f00000011c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(r2, 0x0, 0x10) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") io_submit(r0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d4a450754e50c420fae9972b571112d02") 04:39:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c8e}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:39:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) [ 786.285803] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:39:59 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:39:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) [ 786.793906] kernel msg: ebtables bug: please report to author: entries_size too small 04:39:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x6515bbb9, 0x0, 0x95, 0x0, 0x0, 0x20}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:00 executing program 4: 04:40:00 executing program 1: 04:40:00 executing program 4: 04:40:00 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:00 executing program 1: 04:40:00 executing program 3: 04:40:00 executing program 1: 04:40:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) [ 787.645327] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:00 executing program 4: 04:40:00 executing program 1: 04:40:01 executing program 2: 04:40:01 executing program 1: 04:40:01 executing program 4: 04:40:01 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:40:01 executing program 4: 04:40:01 executing program 3: 04:40:01 executing program 2: 04:40:01 executing program 1: [ 788.645163] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:01 executing program 3: 04:40:01 executing program 2: 04:40:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:40:02 executing program 4: 04:40:02 executing program 1: 04:40:02 executing program 3: 04:40:02 executing program 2: 04:40:02 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:02 executing program 4: 04:40:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:40:02 executing program 3: 04:40:02 executing program 1: [ 789.756521] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:02 executing program 2: clone(0x80080000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)) 04:40:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:40:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) finit_module(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x618, 0x0, 0x2, 0x0, 0x3f, 0x200805c, 0x200000046}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000000)={0x0, "486299310f2da9ce3a43a067864193"}, 0x17, 0x800) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:03 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 790.429006] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:40:03 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 790.938735] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:40:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="00002d99634d22fc99846181638600000000000024a87c"], 0x0, 0x17}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="30010000ffff7627cffb7780248c35872c02431cbe"], 0x0, 0x15}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) finit_module(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 04:40:04 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0xffffffff00000001, 0x8, 0x2, 0x4}, 0x2f) 04:40:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x0, 0x8, 0x2, 0x4}, 0x2f) [ 791.866947] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300001000000004e4124e64d32e68c45d8007b40"], 0x0, 0x14}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:05 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300001000000004e4124e64d32e68c45d8007b"], 0x0, 0x13}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x81, 0x0, 0x5, 0x0, 0x1f, 0x0, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x0, 0x8, 0x2, 0x4}, 0x2f) [ 792.734113] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000f6feff00ff194698005c113587415153"], 0x0, 0x13}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x0, 0x8, 0x2, 0x4}, 0x2f) 04:40:06 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x0, 0x2, 0x4}, 0x2f) 04:40:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x20000009, 0x0, 0x10, 0xfffffffffffffe7a, 0x0, 0x2}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:06 executing program 3: 04:40:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x0, 0x2, 0x4}, 0x2f) 04:40:06 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e428fe8f7428ad446c4ac5c00ba0daceded50d6ebd9a17afa1b78e4a9b74562fe0d1fe85010d7d13db39d9ae859c5e72ee030362d12371efb77ca04310bfd30fc713c8a6f809f3c679fb9e1a8800114f2013377adff0bfe329814bac9d5f0ec10b8404f4427b79645a4b8b81fa7dde0f7823c3b5c6965"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:07 executing program 4: 04:40:07 executing program 2: 04:40:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x0, 0x2, 0x4}, 0x2f) 04:40:07 executing program 3: 04:40:07 executing program 3: 04:40:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x0, 0x4}, 0x2f) 04:40:07 executing program 4: 04:40:07 executing program 1: 04:40:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x0, 0x4}, 0x2f) 04:40:07 executing program 2: 04:40:08 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1db, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:08 executing program 1: 04:40:08 executing program 3: 04:40:08 executing program 4: 04:40:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x0, 0x4}, 0x2f) 04:40:08 executing program 2: 04:40:08 executing program 1: 04:40:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2}, 0x2f) 04:40:08 executing program 3: 04:40:08 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:09 executing program 1: 04:40:09 executing program 4: 04:40:09 executing program 2: 04:40:09 executing program 3: 04:40:09 executing program 1: 04:40:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2}, 0x2f) 04:40:09 executing program 4: 04:40:09 executing program 2: 04:40:09 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:09 executing program 3: 04:40:10 executing program 4: 04:40:10 executing program 1: 04:40:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2}, 0x2f) 04:40:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0xd59, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:10 executing program 4: socketpair$unix(0x1, 0x8000000000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="d5470a0403e9d4433c79c34c1f0002c3d903"], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0fee95ba45ce319173c219000000ffff00006b86"], 0x0, 0x14}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:10 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xa6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:11 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300001000000004e4124e64d32e68c45d8007b40db8a"], 0x0, 0x16}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 798.544555] kernel msg: ebtables bug: please report to author: Wrong len argument 04:40:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81002) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:11 executing program 4: ppoll(0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000040)=0x6, 0x4) 04:40:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{0x0}], 0x1, 0x81002) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) clock_gettime(0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000480)=0xc) sendfile(r0, r0, 0x0, 0x102000000) 04:40:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81002) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002e0000004700000000000000950000008000000012c6cd9c4961d047f9e05169c5de3d430df3"], 0x0, 0x1, 0xc3, &(0x7f0000000480)=""/195}, 0x48) 04:40:12 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 799.357210] kernel msg: ebtables bug: please report to author: Wrong len argument 04:40:12 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) clock_gettime(0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000480)) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x91917196de2e5273) sendfile(r0, r0, 0x0, 0x102000000) 04:40:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81002) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:12 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0}, 0x253) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x400000000008001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x836}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 799.979086] kernel msg: ebtables bug: please report to author: Wrong len argument 04:40:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x1000000003fe, 0x0, 0xd, 0x0, 0xfffffffffffffffd, 0x83, 0xa6}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4000000000001, 0x0, 0x0, 0x0, 0x1f, 0xfffffffffffffff9}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000ffff00ff1946a9005c1135872c02"], 0x0, 0x12}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:13 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x78) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81002) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) [ 800.696736] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:40:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81002) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:14 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x78) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x6, 0xd59, 0x8}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0xd368}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") [ 801.403445] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:40:14 executing program 2: 04:40:14 executing program 4: 04:40:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81002) sendfile(r0, r0, 0x0, 0x102000000) 04:40:15 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x78) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) 04:40:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 04:40:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) sendfile(r0, r0, 0x0, 0x102000000) [ 802.360095] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:40:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}, {0x2f, 'rdma'}]}, 0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000080)) 04:40:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='%d') 04:40:15 executing program 4: 04:40:15 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x102000000) 04:40:15 executing program 1: 04:40:16 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]}, 0x78) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:16 executing program 2: 04:40:16 executing program 1: [ 803.201029] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:40:16 executing program 4: 04:40:16 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x102000000) 04:40:16 executing program 1: 04:40:16 executing program 2: 04:40:16 executing program 0: 04:40:16 executing program 1: 04:40:16 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]}, 0x78) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:17 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x102000000) 04:40:17 executing program 2: 04:40:17 executing program 4: [ 804.058799] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:40:17 executing program 1: 04:40:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x5, 0x805e}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:17 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x800000000005082) sendfile(r0, r0, 0x0, 0x102000000) 04:40:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x805e, 0x200000046}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:17 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]}, 0x78) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 804.702605] kernel msg: ebtables bug: please report to author: Entries_size never zero 04:40:17 executing program 1: 04:40:17 executing program 4: 04:40:18 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x800000000005082) sendfile(r0, r0, 0x0, 0x102000000) 04:40:18 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xee, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede041"]}, 0x166) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:18 executing program 4: 04:40:18 executing program 1: [ 805.471116] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x5, 0x46}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x4020000000001, 0x0, 0x0, 0xb, 0x1f, 0x0, 0xfffffffffffff15e}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000ffff00002d99634d22fc998461816386"], 0x0, 0x14}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:18 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x800000000005082) sendfile(r0, r0, 0x0, 0x102000000) 04:40:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f0000000040)="2e41aef3e1005e57c3420faea9aa6bff01b8d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe53188abc4aba39d470f1faf000000003e44d9f154e50c420fae9972b571112d02") 04:40:19 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xee, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede041"]}, 0x166) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) [ 806.337235] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, 0x7ffffffb, 0x1, 0x4}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:19 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0xee, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede041"]}, 0x166) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300a3d3698bb01be0c93f3420e66dcf3958a"], 0x0, 0x12}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:20 executing program 0: syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e2c9975842c4c2a37d794e005cc4c1b62ac13e0f1110c442019dccd3196f27") clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = gettid() tgkill(r0, r0, 0x1e) 04:40:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) exit(0x0) 04:40:20 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x165, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x1dd) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/78, 0x4e) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS3F(r1, 0x401845ff, 0x0) [ 807.677355] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x102000000) 04:40:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @dev}, 0x80, 0x0}, 0x4041) 04:40:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="b4000000090000005500010000000000"], 0x0, 0x5, 0xc3, &(0x7f00000001c0)=""/195}, 0x48) 04:40:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000009000000550001000000000095000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f00000001c0)=""/195}, 0x48) 04:40:21 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x165, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x1dd) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:21 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x20000b78, 0x0, 0x7f}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300a3d3698bb01be0c93f3420e66dcf3958aa982"], 0x0, 0x14}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) sendfile(0xffffffffffffffff, r0, 0x0, 0x102000000) [ 808.497514] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000ffff00ff1946a9005c1135872c02431ccebe6b35"], 0x0, 0x18}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000e30046d4f0e267f66e7d7beb75534b03"], 0x0, 0x12}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:22 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x165, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000395900000000000000000000200000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b000016090000000000000000000000000000000000f8745d7cffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000027be00000000001000000000000100895fc5d400000012a85f001a4b00000000000000050044dcac2fc85557ede0414a27709ec5a041ecc4c951fd3886b138d6a3d45eca20629959f8f77912a0d74fd477bf5bc8ab065b427d14f0e685fe80e79bb5b788819db68194b8ebfdaecbd1341034f1faa2e1acb2adf7c4a6ca79e7de12a104e2ecb2fbb4529c26cb85c1d5b964dfd7351f2790975b358c003342ecc10cf9b0abc78e"]}, 0x1dd) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) sendfile(0xffffffffffffffff, r0, 0x0, 0x102000000) [ 809.363491] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:22 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x20000b78, 0x80}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0d5be1005e57c3c3e2c9b7d991f347f54a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) sendfile(0xffffffffffffffff, r0, 0x0, 0x102000000) 04:40:22 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1a0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x218) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0xab2d, 0x0, 0x10, 0x0, 0x3, 0x9}) syz_execute_func(&(0x7f00000000c0)="c4827d5a6e0df3e1005e57c3c3e2c9b7d991734e424a2664f0ff064a460f3038082e67660f50e900004681e400000100440fe531feabc4aba39d6c450754e50c420fae9972b571112d02") 04:40:23 executing program 4: 04:40:23 executing program 0: 04:40:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102000000) [ 810.228858] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:23 executing program 4: 04:40:23 executing program 0: 04:40:23 executing program 5: pipe(&(0x7f0000000700)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x1a0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x218) socket$inet6(0xa, 0x100000002, 0x0) unshare(0x20400) r2 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x1, 0x10400) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{}, {r3, r4/1000+10000}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000001e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r8, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r8, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) bind$xdp(r8, &(0x7f0000000100)={0x2c, 0x1, r7, 0x34, r8}, 0x10) 04:40:23 executing program 4: 04:40:23 executing program 1: [ 810.948069] kernel msg: ebtables bug: please report to author: entries_size too small 04:40:24 executing program 0: 04:40:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x800000000005082) sendfile(r0, 0xffffffffffffffff, 0x0, 0x102000000) 04:40:24 executing program 4: [ 811.213693] ================================================================== [ 811.221218] BUG: KMSAN: uninit-value in gue6_err+0x646/0x1130 [ 811.221643] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.0.0+ #17 [ 811.221643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.239344] Call Trace: [ 811.239344] dump_stack+0x173/0x1d0 [ 811.239344] kmsan_report+0x131/0x2a0 [ 811.239344] __msan_warning+0x7a/0xf0 [ 811.239344] gue6_err+0x646/0x1130 [ 811.239344] ? fou6_build_header+0x640/0x640 [ 811.239344] __udp6_lib_err+0x18d0/0x2590 [ 811.239344] udpv6_err+0x118/0x130 [ 811.239344] icmpv6_notify+0x462/0x9f0 [ 811.239344] ? udpv6_rcv+0x70/0x70 [ 811.239344] icmpv6_rcv+0x18ac/0x3fa0 [ 811.239344] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 811.239344] ? kmsan_internal_memset_shadow+0xc6/0x410 [ 811.239344] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 811.239344] ? icmpv6_sk_exit+0x2c0/0x2c0 [ 811.239344] ip6_protocol_deliver_rcu+0xb5a/0x23a0 [ 811.239344] ip6_input+0x2b6/0x350 [ 811.239344] ? ip6_input+0x350/0x350 [ 811.239344] ? ip6_protocol_deliver_rcu+0x23a0/0x23a0 [ 811.239344] ip6_rcv_finish+0x4de/0x6d0 [ 811.239344] ipv6_rcv+0x34b/0x3f0 [ 811.239344] ? local_bh_enable+0x40/0x40 [ 811.239344] process_backlog+0x756/0x10e0 [ 811.239344] ? ip6_rcv_finish+0x6d0/0x6d0 [ 811.239344] ? rps_trigger_softirq+0x2e0/0x2e0 [ 811.239344] net_rx_action+0x78b/0x1a60 [ 811.239344] ? net_tx_action+0xca0/0xca0 [ 811.239344] __do_softirq+0x53f/0x93a [ 811.239344] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 811.239344] ? ksoftirqd_should_run+0x30/0x30 [ 811.239344] run_ksoftirqd+0x26/0x50 [ 811.239344] smpboot_thread_fn+0x4d0/0x9f0 [ 811.239344] kthread+0x4a1/0x4e0 [ 811.239344] ? cpu_report_death+0x190/0x190 [ 811.239344] ? schedule_tail+0x1b2/0x410 [ 811.239344] ? kthread_blkcg+0xf0/0xf0 [ 811.239344] ret_from_fork+0x35/0x40 [ 811.239344] [ 811.239344] Uninit was created at: [ 811.239344] kmsan_internal_poison_shadow+0x92/0x150 [ 811.239344] kmsan_kmalloc+0xa6/0x130 [ 811.239344] kmsan_slab_alloc+0xe/0x10 [ 811.239344] __kmalloc_node_track_caller+0xe9e/0xff0 [ 811.239344] __alloc_skb+0x309/0xa20 [ 811.239344] alloc_skb_with_frags+0x186/0xa60 [ 811.239344] sock_alloc_send_pskb+0xafd/0x10a0 [ 811.239344] sock_alloc_send_skb+0xca/0xe0 [ 811.239344] __ip6_append_data+0x42ed/0x5dc0 [ 811.239344] ip6_append_data+0x3c2/0x650 [ 811.239344] icmp6_send+0x2dc7/0x3c30 [ 811.239344] icmpv6_send+0xe5/0x110 [ 811.239344] ip6_link_failure+0x5c/0x2c0 [ 811.239344] ndisc_error_report+0x106/0x1a0 [ 811.462826] neigh_invalidate+0x359/0x8e0 [ 811.462826] neigh_timer_handler+0xdf2/0x1280 [ 811.462826] call_timer_fn+0x285/0x600 [ 811.462826] __run_timers+0xdb4/0x11d0 [ 811.462826] run_timer_softirq+0x2e/0x50 [ 811.462826] __do_softirq+0x53f/0x93a [ 811.462826] ================================================================== [ 811.462826] Disabling lock debugging due to kernel taint [ 811.462826] Kernel panic - not syncing: panic_on_warn set ... [ 811.462826] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.0.0+ #17 [ 811.462826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.462826] Call Trace: [ 811.462826] dump_stack+0x173/0x1d0 [ 811.462826] panic+0x3d1/0xb01 [ 811.462826] kmsan_report+0x29a/0x2a0 [ 811.462826] __msan_warning+0x7a/0xf0 [ 811.462826] gue6_err+0x646/0x1130 [ 811.462826] ? fou6_build_header+0x640/0x640 [ 811.462826] __udp6_lib_err+0x18d0/0x2590 [ 811.462826] udpv6_err+0x118/0x130 [ 811.462826] icmpv6_notify+0x462/0x9f0 [ 811.462826] ? udpv6_rcv+0x70/0x70 [ 811.462826] icmpv6_rcv+0x18ac/0x3fa0 [ 811.462826] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 811.462826] ? kmsan_internal_memset_shadow+0xc6/0x410 [ 811.462826] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 811.581221] ? icmpv6_sk_exit+0x2c0/0x2c0 [ 811.581221] ip6_protocol_deliver_rcu+0xb5a/0x23a0 [ 811.581221] ip6_input+0x2b6/0x350 [ 811.581221] ? ip6_input+0x350/0x350 [ 811.581221] ? ip6_protocol_deliver_rcu+0x23a0/0x23a0 [ 811.581221] ip6_rcv_finish+0x4de/0x6d0 [ 811.581221] ipv6_rcv+0x34b/0x3f0 [ 811.581221] ? local_bh_enable+0x40/0x40 [ 811.581221] process_backlog+0x756/0x10e0 [ 811.581221] ? ip6_rcv_finish+0x6d0/0x6d0 [ 811.581221] ? rps_trigger_softirq+0x2e0/0x2e0 [ 811.581221] net_rx_action+0x78b/0x1a60 [ 811.581221] ? net_tx_action+0xca0/0xca0 [ 811.581221] __do_softirq+0x53f/0x93a [ 811.581221] ? kmsan_get_shadow_origin_ptr+0x73/0x490 [ 811.581221] ? ksoftirqd_should_run+0x30/0x30 [ 811.581221] run_ksoftirqd+0x26/0x50 [ 811.581221] smpboot_thread_fn+0x4d0/0x9f0 [ 811.581221] kthread+0x4a1/0x4e0 [ 811.581221] ? cpu_report_death+0x190/0x190 [ 811.581221] ? schedule_tail+0x1b2/0x410 [ 811.581221] ? kthread_blkcg+0xf0/0xf0 [ 811.581221] ret_from_fork+0x35/0x40 [ 811.678930] Kernel Offset: disabled [ 811.678930] Rebooting in 86400 seconds..